Category: Politics

  • MIL-OSI USA: LEADER JEFFRIES STATEMENT ON THE PASSING OF REP. GERRY CONNOLLY

    Source: United States House of Representatives – Congressman Hakeem Jeffries (8th District of New York)

    Today, Democratic Leader Hakeem Jeffries released the following statement:

    The Democratic Caucus, the Commonwealth of Virginia and the country have lost a hardworking, humble and honorable public servant with the passing of Congressman Gerry Connolly. 

    For more than three decades, Gerry relentlessly defended our democracy on the Oversight Committee, where he became a Subcommittee Chair and then the Ranking Member. As the co-author of the Issa-Connolly Federal Information Technology Acquisition Reform Act (FITARA), he was instrumental in overhauling our federal IT laws and ensuring our government institutions remain strong and secure. He used his foreign policy expertise as both a Senate staffer and a Member of the People’s House to bolster our transatlantic alliance, serving twice as the President of the NATO Parliamentary Assembly. Even as he battled a difficult cancer diagnosis, Ranking Member Connolly continued to push back against the unprecedented attacks on the federal workers in his district and across the country.

    In addition to his legislative wisdom, Gerry always brought his signature mirth and wit to the House, making even something like proxy voting a point of levity during an otherwise challenging time in our nation. My prayers, and those of the entire House Democratic Caucus, are with Congressman Connolly’s loved ones and the devoted staff who he considered to be his family. 

    ###

    MIL OSI USA News

  • MIL-OSI: $255 Payday Loans: Direct lender, Same Day, No Credit Check – Payday Loans Online Near Me – Wizzay

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    With the world becoming increasingly fast-paced, unexpected bills can crop up at anytime, leaving people in urgent need of cash. For people with impending cash emergencies, $255 payday loans online same day provide a hassle-free and quick solution. The loans are meant to bring immediate financial reprieve, particularly for those with poor credit or those without access to other avenues of conventional credit.

    This detailed guide delves into the intricacies of $255 payday loans, such as the benefits of dealing with direct lenders like Wizzay, having in mind the requirements to be eligible, and options for those with varying credit scores.

    Wizzay: Best Platform to Get $255 Payday Loans Online with Same Day Approval from Direct Lenders | Instant Approval

    Wizzay is a top platform that connects borrowers with direct lenders offering $255 online payday loans with same-day approval. With a simple-to-use interface and an established network of good lenders, Wizzay makes borrowing easier, money available instantly without the red tape involved with normal credit checks.

    Wizzay makes it easy for lenders to complete a simple online application, receive the approval decision within seconds, and deposit funds into their bank account, typically on the same business day. Quickness is an ideal feature for those who require fast money.

     <<>>

    $255 Payday Loans Online Same Day California

    When faced with urgent bills like medical or auto emergencies, waiting days for approval of a conventional loan isn’t possible. Same-day approved online $255 payday loans provide the quick cash relief many Americans need.

    California residents have their own state regulations on payday loans. The typical maximum cash amount borrowed in California is $255 (after fees), so this is a typical loan amount all over the state. Wizzay connects California borrowers with licensed lenders who work within the state framework.

    The main advantages for California residents are:

    • Compliance with state laws
    • Borrower maximum fee caps
    • Simple disclosure requirements
    • Licensed lender connections

    What Are Payday Loans?

    Payday loans are temporary lending options that bring prompt fiscal relief until your next paycheck. Payday loans generally:

    • Range from $100 to $1,000 (with $255 being a typical sum, particularly in California)
    • Have 2-4 week repayment terms (due on your subsequent payday)
    • Come with higher interest rates than regular loans because they’re short-term
    • Are low-documentation compared to regular bank loans
    • Disburse quickly, often the same day that they approve you

    Unlike conventional loans that can take weeks to finalize, payday loans provide succor in times of financial crisis when time is crucial.

     <<>>

    Why You Should Go For Payday Loans Online?

    The advent of the Internet age has revolutionized the payday lending business. Online lenders such as Wizzay have made it easier than ever before by providing:

    • 24/7 application access
    • Paperless paperwork
    • Data encryption security
    • Instant approval messages
    • Direct fund deposit

    Applying for online payday loans avoids going to brick-and-mortar stores, filling out paper forms, or standing in line. The whole process, from funding application, can be done from your couch using any internet-enabled device.

    Most Trusted $255 Payday Loan Option Online With No Credit Check – Wizzay

    Wizzay has become the most reliable site for $255 online payday loans, especially for credit check worrisome borrowers. Although no genuine lender can provide strictly “no credit check” loans, Wizzay is a partner to direct lenders who:

    • Pay more attention to your present income and repayment capability
    • Look beyond regular credit ratings
    • Make soft credit checks that don’t affect your credit rating
    • Approve loans to borrowers from all sections of the credit spectrum

    This second option for creditworthiness makes Wizzay a great choice for less-than-stellar credit customers who require money in a hurry.

     <<>>

    Common Uses for Same Day Payday Loans With Wizzay

    Same-day payday loans through Wizzay act as an emergency financial safety net for numerous surprise expenses, like:

    • Out-of-pocket medical or dental costs that insurance doesn’t cover
    • Emergency car repairs when your vehicle is required for work
    • Overdue bills for power to avoid disconnection
    • Unforeseen home repairs such as faulty water heaters or AC systems
    • Covering small gaps between paychecks when bills are payable
    • Preventing costly overdraft or late payment charges

    These short-term loans bring peace of mind when working with time-critical financial expenses that cannot wait until your upcoming paycheck.

    Advantages of Choosing Wizzay for $255 Payday Loans from Direct Lender California

    Selecting Wizzay for your California $255 payday loan requirements has several benefits:

    • Easy Application Process: Fill up within minutes from your device
    • Large Network of Trustworthy Direct Lenders: Experience several lending opportunities on one platform
    • Easy-to-Understand Terms and Conditions: Complete transparency of all charges and repayment information
    • Fast Decision: Usually within a few minutes of application submission
    • Same-Day Funds: Funds credited to your bank account on the same business day
    • Secure Data Protection: Top-level encryption and privacy safeguards
    • 24/7 Online Convenience: Use anytime, day or night, weekends included
    • No Surcharge Fees: All fees disclosed before you sign up

    These advantages make Wizzay the Californians’ first choice for speedy financial solutions without messy processes.

    $255 Payday Loans Online Same Day With Wizzay

    Wizzay’s site is all about getting $255 online payday loans with same-day processing. This loan amount is especially favored in California, given the state’s regulations.

    The process is as follows:

    • Fill out the easy online application form with your information
    • Get instant pre-qualification feedback
    • Compare loan offers from direct lenders
    • Choose the best offer with the best terms
    • Finish any other verification steps with the lender
    • Get money into your bank account, usually on the same business day

    The whole procedure is made for ultimate efficiency, so you can tackle your financial crisis without any delay.

     <<>>

    Who Should Consider a $255 Payday Loan Online?

    Payday loans can be a help, but they’re not for everyone. You may want to use a $255 payday loan via Wizzay if you:

    • Are in a sudden, short-term financial situation
    • Have depleted other lower-cost borrowing sources
    • Have a regular income source with future paychecks
    • Require money today, and can’t wait for conventional loans
    • Can pay back the entire amount on your upcoming payday
    • Understand the greater cost of short-term borrowing

    Payday loans operate best as a short-term bridge in true financial emergencies, but not as a long-term financial option.

    Wizzay Offers No Denial Payday Loans Direct Lenders Only

    No lender can possibly approve everybody, but direct tribal loan lenders collaborating with Wizzay approve more people than big financial institutions. “No denial” is used to describe lenders who:

    • Approve applications from bad credit borrowers
    • Pay less attention to credit history than to income now
    • Have numerous loan products to suit various needs
    • Give definite reasons if the application cannot be approved
    • Dealing with direct lenders bypasses middlemen and results in:
    • Quicker processing times
    • Lower total costs
    • More customized service
    • Direct access to the funding source

    Wizzay’s $255 Payday Loans Eligibility Criteria: What do You Need to Qualify?

    To be eligible for a $255 payday loan with Wizzay’s group of direct lenders, you would usually have to satisfy these minimum requirements:

    • Be at least 18 years old
    • Be a US citizen or resident alien
    • Have a valid government-issued identification
    • Have an open checking account in your name
    • Provide evidence of steady income (employment, benefits, etc.)
    • Give a current email address and telephone number
    • Have a minimum monthly income (usually $1,000+)

    Unlike bank loans, payday lenders with no credit check usually do not require ideal credit histories or large amounts of financial records, so the application procedure is more convenient.

     <<< Bad Credit? No Problem – Wizzay Offers $255 Loans with No Credit Check>>>

    How Do Payday Loans Online Work?

    Payday loans via online websites like Wizzay function differently from bank loans:

    • Application: Fill out your information using an encrypted online application
    • Verification: Lenders check your identity and income information
    • Approval: Get loan offer with conditions and terms
    • Acceptance: Sign loan agreement electronically
    • Funding: Funds are credited directly to your bank account
    • Repayment: Amount of loan and fees are deducted automatically from your account on the scheduled date

    The whole process is fast and easy, doing away with paperwork and physical visits to obtain traditional lending.

    What Are 1 Hour Payday Loans Online?

    When minutes are of the essence, 1-hour payday loans from Wizzay’s network can bring ultra-rapid relief. While not all applications can be reviewed this rapidly, numerous lenders attempt to:

    • Review applications in minutes
    • Make instant approval determinations
    • Process funding requests instantly
    • Deposit funds as soon as possible technically

    1 Hour Payday Loans Online from Direct Lenders – Fast Approval Process

    Wizzay’s direct lender network is all about quick loan processing, which usually issues approval responses within 1 hour of application. This speedy time frame involves:

    • Initial Application: 5-10 minutes to fill out online
    • Automated Verification: Seconds to minutes
    • Lender Review: 15-60 minutes within business hours
    • Final Approval: Often within 1 hour of completing all necessary information
    • Fund Transfer: Fund transfer initiated immediately upon approval

    Most borrowers get the funds the same business day, especially when approved in the morning.

    <<>>

    $255 Payday Loans Direct Lender California

    California has unique rules covering payday lending, which makes the $255 loan figure popular in the state. When applying for a $255 payday loan in California via Wizzay, you’ll enjoy:

    • State-regulated maximum fees and interest rates
    • Authorized direct lenders that work within legal parameters
    • Transparent disclosure of all loan terms mandated by state law
    • Shield from predatory lending
    • Uncomplicated repayment terms 
    • No hidden penalties

    Wizzay ensures that all participating lenders are within California’s lending laws, giving borrowers an extra layer of protection and clarity.

    How To Get $255 Payday Loans Online Same Day In California?

    Getting a $255 payday loan in California via Wizzay is easy:

    • Visit Wizzay’s Website: Go to their secure online website
    • Start Your Application: Click on the application for loan button
    • Enter Personal Information: Enter your basic info and contact info
    • Submit Income Details: Enter work details and income proof
    • Provide Banking Information: Include your checking account information for transferring funds
    • Review and Submit: Make sure all details are correct before submitting
    • Receive Approval: Wait for lender approval notice
    • Accept Loan Terms: Review and agree to the provided loan agreement
    • Get Funds: Look for the deposit in your bank account, usually the same day

    Loans for Bad Credit: Why Payday Loans Still Work

    Conventional lending companies tend to deny borrowers with bad credit scores, making many lenders have fewer choices when money emergencies arise. Payday loans are still viable options for these people because:

    • Credit decisioning based on approval is more driven by current earnings than by credit record
    • Loan sizes are fairly low, minimizing lender exposure
    • Short-term repayment involves less long-term risk consideration
    • Direct deposit confirmation gives lenders payment security
    • The emergency nature of these loans makes higher interest charges understandable

    Using Wizzay, bad credit borrowers may still have access to emergency cash when conventional doors are shut.

      <<>>

    Benefits of Payday Loans for Bad Credit Borrowers

    For those who have low credit scores, payday loans provide several unique benefits:

    • Accessibility: Greater approval rates than conventional loans
    • No Credit-Building Requirements: No requirement for existing credit history
    • Fast Funding: Instant availability of money with no long approval processes
    • Minimal Documentation: Fewer papers needed than traditional loans
    • Fixed Fees: Absolute knowledge of total amount to be repaid upfront
    • No Collateral Required: No requirement for putting valuable possessions at risk
    • Credit Score Protection: Some lenders never report to major credit bureaus

    These advantages render payday loans from Wizzay an efficient option for subprime borrowers with timely financial requirements.

    Online Application Process for Instant Approval Explained

    The application process from Wizzay is optimized for efficiency:

    • Enter minimal personal data (address, name, etc.)
    • Supply job information and income verification
    • Supply banking details for deposit and repayment
    • Be given instant initial approval
    • Make final checks on terms from participating lenders
    • Accept and collect the funds

    The majority of applications only take less than 5 minutes to fill out.

    Payday Loans Online Without Traditional Credit Checks – Are They Safe?

    Lenders in Wizzay’s network of lenders usually conduct alternative verification instead of standard credit checks, such as:

    • Employment verification
    • Income verification
    • Bank account stability checks
    • Identity verification

    Such lenders have stringent security measures, such as:

    • Data encryption
    • Secure application websites
    • Privacy protection
    • Regulatory compliance

      <<>>

    Risks and Downsides of $255 Payday Loans

    Payday loans can offer vital emergency funds, but there are possible disadvantages, such as:

    • Higher charges than standard loans
    • Short payoff timeframes
    • Potential for renewal cycles if not paid on time
    • Not ideal for long-term money problems

    Responsible borrowers should have a solid repayment plan before taking any loan.

    What Does a Direct Lender Do That Other Lenders Don’t?

    When you utilize Wizzay, you are matched with direct lenders instead of brokers. This difference provides several benefits:

    • No Intermediary Fees: No extra broker fees
    • Faster Processing: Direct contact with the true funding source
    • More Transparent Terms: Deal directly with the entity setting loan conditions
    • Simplified Communication: Single point of contact throughout the loan process
    • Greater Security: Less sharing of personal information between multiple parties
    • Direct Accountability: The lender is fully responsible for all aspects of your loan

    These benefits make direct lenders through Wizzay’s platform preferable to working with loan brokers or matching services that may add costs and complexity.

    Comparing the Best Payday Loans and Direct Lenders Online

    Wizzay differentiates itself from others by providing:

    • Larger lender network for more loan choices
    • Higher approval rates for approved applicants
    • More fair fee structures
    • Improved customer service ratings
    • Faster average funding times

    <<>>

    $255 Payday Loan Direct Lender vs. Broker: Which is Better?

    You’ll find both direct lenders and brokers when you’re looking for a $255 payday loan. Knowing the difference makes the right choice:

    Direct Lenders (available on Wizzay):

    • Advise and finance loans directly from their own funds
    • Establish their own terms and interest rates
    • Take applications and make approvals
    • Service all parts of the loan
    • Have direct contact with borrowers

    Brokers:

    • Match borrowers with several prospective lenders
    • Charge fees for matching services
    • Disclose your details to many lenders
    • May lack insight into final loan terms
    • Create an additional step in the communication process

    For the majority of borrowers looking for speed and simplicity, direct lenders via Wizzay’s marketplace generally provide an improved experience with less hassle and intermediary fees.

      <<< Bad Credit? No Problem – Wizzay Offers $255 Loans with No Credit Check>>>

    Alternatives to $255 Payday Loans for Bad Credit Borrowers

    Instead of getting a payday loan, try these options:

    • Installment loans: Extended repayment schedules with lower payments
    • Credit unions or community lenders: Usually provide cheaper emergency loans
    • Borrowing from friends/family: Usually interest-free, but can put a strain on relationships
    • Payday advance apps: More recent services offering advances on earned wages

    What to Know Regarding Payday Loan Direct Lenders

    When using direct lenders in collaboration with Wizzay’s platform, note the following guidelines:

    • Check if the lender is licensed in your state
    • Check your state’s payday loan rate and fee caps
    • Check if loan rollovers are permitted in your area
    • Get a sense of how a lender handles late or skipped payments
    • See how your financial and personal data will be handled
    • Compare customer feedback with specific lenders
    • Assess responsiveness and quality

    Wizzay screens its lending partners, but it’s even better to do your own research.

    Tips to Get Same Day Approval and Funding

    To get the best opportunity for same-day funding:

    • Use early in the morning (before 10 am local time)
    • Have all documentation prepared before applying
    • Verify all application details for accuracy
    • Answer quickly to any verification requests
    • Read and accept the terms speedily when approved

       <<>>

    Payday Loan Same Day Near Me: Where to Find Same Day Payday Loans No Credit Check?

    Rather than going to traditional retail stores, Wizzay allows you to access same-day payday loans anywhere in California. Just apply online, get instant matching, and pick up your cash quickly — all from the comfort of your own home.

    Final Thoughts – Should You Apply for a $255 Payday Loan Online Today?

    $255 direct lender payday loans with Wizzay can be a source of crucial money in times of urgency if used sensibly. These loans are best suited when:

    • You are confronting a serious financial crisis
    • You have already tried cheaper alternatives
    • You have a definite strategy to pay on your subsequent payday
    • The effect of not having money immediately would be more expensive

    If your case fits the above-mentioned, Wizzay provides a safe, convenient platform through which you can get in touch with reliable direct lenders who can advance the emergency funds you require with same-day approval and disbursement.

    Frequently Asked Questions

    How can I get $1000 today?

    You may take out a $1000 payday loan using online marketplaces such as Wizzay, where you are connected with direct lenders that grant same-day financing upon approval.

    Can I borrow money online instantly?

    Yes, you can borrow money online with practically instantaneous approval using payday loan sites, although delivery of funds is subject to your bank’s processing period.

    Are payday loans legal in California?

    Yes, payday loans are legal in California under certain rules capping them at $300 maximum loan value (including fees) and a 15% maximum fee of the face value of the check.

    How to get a loan when no one will approve you?

    Look to payday lenders that place less emphasis on credit scores than income verification, look into secured loan alternatives, attempt credit unions with less stringent requirements, or look into payday alternative loans.

    Where is the easiest place to get a payday loan with bad credit?

    Online lending websites such as Wizzay that are designed to match borrowers with direct lenders who care less about credit history and more about income stability are usually the simplest places to obtain payday loans with bad credit.

    How to borrow $500 quickly?

    To take out a $500 loan fast, request an online payday loan via websites such as Wizzay, opt for cash advance apps, take out pawn loans, or ask for a small personal loan from credit unions with same-day approval.

    Do payday loans get denied?

    Yes, payday loans can be denied if you fail the fundamental requirements, such as minimum income levels, do not have proper identification, have existing payday loans, or give conflicting information on your form.

    Media Details:

    https://www.wizzay.com

    support@Wizzay.com

    Customer Acquisition LLC, Springates Building, Lower Government Road, Charlestown,

    Attachment

    The MIL Network

  • MIL-OSI: No Credit Check Loans: Small Payday & Emergency Loans from Direct Lenders for Bad Credit – ( Guaranteed Approval Loans ) – HonestLoans

    Source: GlobeNewswire (MIL-OSI)

    New York City, NY, May 21, 2025 (GLOBE NEWSWIRE) —

    Are you in search of funds but concerned about your credit history? No credit check loans may be just the thing for you. No credit check loans are specially crafted for those who have bad credit history or do not wish to have their credit score impacted by hard inquiries. In this detailed guide, we will cover all you want to know about no credit check loans and why HonestLoans is the finest option in this field.

    Why HonestLoans Is The Best Option For No Credit Check Loans

    In the case of no credit check loans, Honest Loans beats other options for several reasons. With a huge network of reliable direct lenders, Honest Loans makes sure that borrowers find themselves connected with lenders who have expertise in offering loans without conventional credit checks.

    Honest Loans provides:

    • Easy and quick application process
    • High approval rates for all credit histories
    • Transparent fee structure with no hidden fees
    • Rapid funding, usually within 24 hours or shorter
    • Multiple loan options to cater to different financial situations

    Unlike most other loan-matching services, HonestLoans values customer satisfaction and financial health, earning them the top preference for acquiring a loan with no credit check from a direct lender.

     <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Understand No Credit Check Loans | Loans Without Credit Checks, Guaranteed Approval From Direct Lender

    What Is A No Credit Check Loan?

    A no credit check loan is a product where the lender will not do a standard “hard pull” of your credit history at the time of application. Rather than considering your credit score, lenders consider other items like:

    • Current income level
    • Job stability
    • Bank account status and activity
    • Debt-to-income ratio
    • Alternative data points

    These loans are tailored for borrowers with bad credit records, thin credit histories, or who do not wish to incur further hard inquiries on their credit reports.

    What Kind Of Loans Don’t Need A Credit Check?

    A number of loan types usually don’t need traditional credit checks:

    • Payday Loans: Short-term, high-interest loans based on your pay
    • Title Loans: Secured loans using your car as collateral
    • Pawn Shop Loans: Secured loans tied to the value of things you lend temporarily
    • Some Installment Loans: More long-term loans with fixed installments that emphasize income verification
    • Cash Advances: Short-term loans against future income or available credit card limits
    • Some Personal Loans: Some alternative lenders provide personal loans without credit checks

    Each of these types of loans has its own merits, needs, and cost factors. HonestLoans allows the borrower to know which type is the best for their own particular financial circumstances.

     <<>>

    How Do Loans With No Credit Check Work?

    No credit check loans are different from bank loans:

    • Application: Fill out simple personal and financial details on the internet via sites such as HonestLoans
    • Verification: Your identity, income, and banking details are confirmed by lenders
    • Alternative Assessment: Rather than credit checks, lenders consider such things as income stability and banking history
    • Approval Decision: Be given a lending decision, often in minutes
    • Loan Agreement: Sign off and agree to the loan terms and conditions
    • Funding: Get paid through direct deposit, often within one business day or sooner

    The whole process is intended to be fast and accessible, particularly for people who could be denied such traditional banking services as a result of credit history problems.

    1 Hour Payday Loans Online No Credit Check Instant Approval From HonestLoans

    For emergency financial needs, 1 hour payday loans provide a savior. HonestLoans puts you in touch with lenders that offer instant approval—at times in under an hour.

    Main features of HonestLoans

    HonestLoans is unique in the no credit check loans market with a number of key features:

    • Friendly Platform
    • 256-bit Encryption
    • Free Service
    • Extensive Lender Network
    • Clear Process
    • Educational Content
    • Good Customer Support
    • Fast Results
    • 24/7 application availability
    • Real-time matching with direct lenders
    • Funds paid through ACH or prepaid card
    • No paperwork or faxing
    • Minimal documentation – ID and proof of income

    These elements work together to provide a hassle-free borrowing process that ranks your financial security and needs first.

     <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    How HonestLoans’ Direct Lender Network Ensures No Denial Loans without credit checks

    In contrast to conventional financial institutions, HonestLoans utilizes a direct lender network that focuses on bad credit and no credit profiles. This decreases the possibility of rejection by matching you with a lender who can accommodate your individual financial profile.

    Why Honestloans Provides Guaranteed Approval Payday Loans Without Credit Check For Bad Credit?

    Although no loan is technically “guaranteed,” HonestLoans increases your chances of approval by:

    • Soliciting non-hard credit checks
    • Sourcing alternative income verification
    • Skipping conventional underwriting models
    • Offering alternatives for self-employed and part-time employees

    Advantages Of Using HonestLoans for Emergency Loans For Bad Credit

    In the event of a financial emergency with poor credit, Honest Loans provides several benefits:

    • Easy application process
    • Good approval rating for bad credit customers
    • Rapid funding, in some cases within 1 hour
    • No collateral needed
    • Clear loan terms

    These advantages make Honest Loans an ideal option for anyone in need of emergency funding irrespective of credit issues.

     <<>>

    HonestLoans’ Application and Funding Process – 1 Hour Payday Loans Online No Credit Check Instant Approval

    HonestLoans simplifies the loan process to obtain funds in the shortest time possible:

    • Go to the Honest Loans website
    • Complete the application form (around 3 minutes)
    • Compare lender deals
    • Digitally agree to terms
    • Fund received in as fast as 60 minutes

    This streamlined process allows borrowers in emergency situations to obtain funds when they are most in need, without delay or burdensome paperwork.

    Various Alternatives Provided for for Small Payday Loans Online With No Credit Check By HonestLoans

    HonestLoans provides borrowers with a range of small loan alternatives, including:

    • Traditional Payday Loans
    • Installment Payday Loans
    • Tribal Loans
    • Flex Loans
    • Cash Advances
    • Bad Credit Personal Loans
    • Paycheck Advances
    • $100 – $500 loans
    • Weekly or biweekly payment plans
    • Optional rollover or extended terms

    This diversity of loan offerings allows borrowers to locate the particular loan product which most closely matches their individual financial profile and repayment capabilities.

     <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    Honest Loans’s No Credit Check Options vs. Traditional Loans

    HonestLoans offers a faster, easier option to banks, especially if you have bad credit.

    Let’s compare the important aspects:

    • Credit: Banks always pull credit. HonestLoans does not, so it’s easier to qualify.
    • Speed: Bank loans take days to receive. HonestLoans approves and deposits your loan within the hour.
    • Eligibility: Banks require good credit and a steady job. HonestLoans considers your income, number of active bank accounts, and not credit history.
    • Loan Amounts: Bank loans are large loans with long repayment terms. HonestLoans offers $100-$1000 short-term loans (today).
    • Application: Bank loan applications take forever. HonestLoans is online and takes minutes to complete.

    HonestLoans is the more convenient option if you want quick, easy financing when traditional financing is not available.

    Features And Benefits Of No Credit Check Loans With Guaranteed Approval From Direct Lender

    No credit check guaranteed approval loans provided by direct lenders possess various important features and advantages that benefit many borrowers:

    Important Features:

    • Direct funding source with no intermediaries
    • Streamlined application process
    • Income-focused instead of credit-based
    • Transparency in fee structure
    • Fast funding term
    • Simple repayment terms

    These features and advantages come together to produce a financial product that benefits those who are usually skipped by conventional banking organizations.

     <<< Bad Credit? No Problem – Get Quick, Hassle-Free Loans from HonestLoans Today>>>

    Eligibility Criteria for Loans Without Credit Check For Borrowers With Poor Credit History

    Although no credit check loans are easier to obtain than regular loans, borrowers must still satisfy basic criteria:

    • Regular Income: Regular source of income (job, benefits, etc.)
    • Active Bank Account: Active check account in good standing for receiving loan funds
    • Age Requirement: At least 18 years old (19 in certain states)
    • Identification: Valid government-issued photo ID
    • Contact Information: Current phone number and email address
    • Residency: U.S. citizenship or permanent residency
    • No Outstanding Payday Loans: Previous payday loans need to be paid in full

    Satisfying these conditions also greatly enhances your chances of loan approval even with bad credit history. HonestLoans cooperates with lenders who are more interested in these factors than with conventional credit scores.

    Various Types of Emergency Loans | Instant Payday Loans For Bad Credit No Credit Check

    Personal Loans

    Bad credit personal loans are unsecured loans with the following characteristics:

    • Amounts ranging from $500 to $5,000
    • Payback periods ranging from months to years
    • Fixed rates and consistent payments
    • Funds used for any expense
    • Possible reporting to credit bureaus to establish or rebuild credit

    Credit Card Cash Advances

    Cash advances permit borrowing against available credit card lines:

    • Instant access via ATMs or banks
    • No separate application process
    • Available up to your cash advance limit
    • Higher interest rates than standard purchases
    • Additional cash advance fees typically apply

      <<< Get Your Emergency Loan Today – No Credit Check, Guaranteed Approval with HonestLoans>>>

    Payday Loans

    Payday loans are short-term loans due on your next payday:

    • Typically $100 to $1,000
    • Very short terms (2-4 weeks)
    • Higher interest rates
    • Simple qualification requirements
    • Fast funding (same-day or next-day)
    • Based primarily on income verification

    Title Loans

    Title loans use your vehicle as collateral:

    • Loan amount based on vehicle value (25-50%)
    • Must own vehicle outright
    • Continue driving while repaying
    • Higher loan amounts than unsecured options
    • Longer repayment terms possible
    • Risk of vehicle repossession if unable to repay

    Paycheck Advances

    Paycheck advances offer early access to wages earned:

    • Access portion of wages prior to payday
    • Lower fees than regular payday loan
    • Often through employer program or app
    • Repayment automatically taken from paycheck
    • No credit check needed
    • Limited to amount already earned

      <<>>

    Urgent Loans For Bad Credit: How Long Does It Take to Get Approved?

    With bad credit, timing is everything when dealing with a financial emergency. Here’s what the approval timeframe looks like:

    • Application: 5-10 minutes to finish
    • Initial Decision: Typically instant to 15 minutes
    • Documentation Verification: 1-24 hours
    • Final Approval: As fast as 1 hour, usually within 24 hours
    • Funding: Some lenders provide 1-hour funding, others 24 hours

    HonestLoans partners with lenders who value speed, with most providing same-day approval and financing for approved borrowers.

    Payday Loans Online No Credit Check Instant Approval

    No credit check payday loans online with instant approval have transformed emergency lending by not only making the process quicker and more convenient than ever but also allowing us to disburse funds faster.

    Schedule for Quick Loans No Credit Check Disbursement

    Standard fund disbursement schedule:

    • Same Business Day: Applications received prior to 10:30 AM
    • Next Business Day: Applications received after cut-offs
    • Weekend Requests: Typically processed Monday (weekend funding provided by some lenders)
    • Bank Processing: Depends on the bank

    1 Hour Payday Loans Online No Credit Check Instant Approval

    For the quickest funding, the process is as follows:

    • Fill out HonestLoans’ quick application
    • Get instant pre-qualification
    • Send verification documents online
    • Get final approval, usually in minutes
    • Get funds via expedited bank deposit

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    $255 Payday Loans Online Same Day

    These typical small loans provide:

    • Protection for small emergency costs
    • Simpler qualification terms
    • Faster approval process
    • Same-day funding when applied early
    • Less intimidating repayment amounts

    Pros and Cons of No Credit Check Loans

    As with any financial product, no credit check loans have benefits and drawbacks that are worth considering by the borrower.

    Pros:

    • Available to bad credit holders
    • Rapid application and funding
    • Low documentation needed
    • No hard credit checks
    • For use in multiple kinds of emergencies
    • Can prevent late charges or disconnection of services

    Cons:

    • Increased interest and fees
    • Repayment periods are shorter
    • Risk of debt cycle trap
    • May not establish credit if not reported
    • Smaller loan amounts than traditional ones
    • Predatory lenders exist in the industry

    Some predatory lenders target susceptible borrowers (that is why operations like HonestLoans are worth it)

    No Credit Check Loan Scenario in the USA

    The business landscape consists of:

    • Around 12 million Americans utilize payday loans every year
    • More than 23,000 payday lenders have business in the country
    • State laws differ significantly
    • Online lending opened up access beyond locations
    • Average payday loan amount is roughly $375

    HonestLoans operates within this environment by matching borrowers with solid lenders that work within regulations while ensuring fair terms.

      <<>>

    Alternatives to Small Payday Loans Online No Credit Check and Urgent Loans No Credit Check

    Alternatives to mainstream small payday loans:

    • Installment Microloans: Smaller loans with several payments
    • Cash Advance Apps: Mobile apps for wage advances
    • Credit Union Payday Alternative Loans: Less expensive alternatives
    • Small Personal Loans: Mainstream lenders with less restrictive requirements
    • Family and Friend Loans: Private loan sources

    $500 Cash Advance No Credit Check Loans

    The $500 cash advance is in demand because it:

    • Pays for most typical emergencies
    • Provides affordable payment sizes
    • Is easily accessible from many lenders
    • Typically offers same-day loans
    • Usually asks for $1,000-$1,500 monthly income

    Emergency Loans No Credit Check

    Emergency no credit check loans assist when:

    • Medical conditions need to be paid immediately
    • Car repairs are necessary for work commute
    • Repairs for the home are needed for safety
    • Critical utilities threaten disconnection
    • Other immediate needs loom in the financial future

    Some Risk-Free Alternatives to No Credit Check Loans

    Although no credit check loans have a valuable function, customers should think about these likely lower-cost options:

    Secured Loans

    Secured loans employ collateral to limit lender risk:

    • Less than unsecured rates
    • More available amount of money
    • Longer time to repay
    • Access through traditional credit unions and banks
    • Possibility of losing collateral if cannot repay

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Credit Unions

    Credit unions tend to be more flexible in lending:

    • Member-oriented approach
    • Payday Alternative Loans with caps on lower rates
    • More individualized assessment
    • Financial literacy tools
    • Opportunity to develop positive relationships
    • Demand membership (typically with small fees)

    Peer-to-Peer Lending

    P2P websites bring borrowers together with individual investors:

    • Consider non-credit score factors
    • Competitive rates for most borrowers
    • Flexible qualification
    • Transparent fee practices
    • Diverse loan amounts and durations
    • Easier application process

      <<< HonestLoans Has You Covered – Get Direct Lender Emergency Loans with No Credit Checks>>>

    What Are the Risks of No Credit Check Loans?

    No credit check borrowers must be aware of some possible dangers:

    • Exorbitant prices (interest rates and fees)
    • Short payment periods putting pressure
    • Possible cycles of debt
    • Predatory lenders preying on vulnerable borrowers
    • Differing state laws and consumer protections
    • Limited opportunity to build credit
    • Access to bank account for automatic debit

    Engaging in reputable services such as HonestLoans reduces these risks by linking borrowers with responsible lenders.

    How to Apply for No Denial Payday Loans Direct Lenders Only With No Credit Check?

    The process of application for no denial payday loans by direct lenders is simple:

    1. Gather Required Information:

    • Government ID
    • Proof of income
    • Active checking account info
    • Social Security Number
    • Contact details

    2. Select a Reputable Platform:

    • HonestLoans matches you with reliable direct lenders
    • Free service with no obligation
    • Personal info is secure using encryption

    3. Complete Application:

    • Enter personal and financial information
    • Enter amount of loan desired
    • Enter employment details
    • Enter banking information for funds transfer

    4. Review Offers:

    • Compare offers from various lenders
    • Watch for APR, fees, and terms of repayment
    • Look for hidden fees

    5. Accept Loan Terms:

    • Read the whole loan contract
    • Have questions answered about anything that is unclear
    • E-sign the contract

    6. Receive Funds:

    • Direct deposit into your bank account
    • Funding times from 1 hour to 1 business day

    Why Go For No Credit Check Loans?

    These loans serve important purposes:

    • Perfect for those with damaged credit histories
    • Faster than traditional loans during emergencies
    • Simple online application available 24/7
    • Accessible to those excluded from traditional banking
    • Private way to handle financial challenges
    • Avoid hard inquiries that damage credit scores
    • Bridge financial gaps between paychecks
    • Address urgent situations without delay

    How to Find a Reputable No Credit Check Loan Direct Lender?

    Search for lenders with:

    • Transparent fee terms and clear charges
    • Regulatory compliance
    • Good customer feedback
    • Secure sites (https)
    • Solid history
    • Membership in industry associations
    • Educational materials
    • No charges upfront

    Steer clear of lenders displaying:

    • Guaranteed approval with no conditions
    • High-pressure tactics
    • Sneaky charges or ambiguous charges
    • No address or contact information
    • Requests for unconventional payment options
    • Very high interest charges

    HonestLoans pre-screens their network of direct lenders to guarantee they are held to high standards for good lending practices.

    Where to Find The Best No Denial Payday Loans From Direct Lenders Only With No Credit Check?

    When looking for no denial payday loans from direct lenders with no credit checks, HonestLoans is the best choice for a variety of reasons:

    • Large lender pool boosting chances of approval
    • Vigorous lender screening guaranteeing ethical practices
    • No-charge service with no platform fee
    • Bank-level protection safeguarding your data
    • Easy application process
    • Educational materials to make informed decisions
    • Friendly customer support
    • Clear terms prior to commitment

      <<< Need Fast Cash for an Emergency? Get a No Credit Check Loan Today from HonestLoans>>>

    Final Words

    No credit check loans offer useful money solutions to persons with credit issues or crises that have to be addressed immediately. Although loans do generally incur more expense compared to conventional lending, they play a necessary role in the financial system by making available funds to persons who would otherwise have no alternative.

    For individuals requiring rapid access to funds without the usual credit checks, HonestLoans provides a trusted, secure portal linking borrowers directly with established direct lenders. Transparency, security, and customer education are their top priorities, and for this reason, they are the best in the no credit check loan market.

    Frequently Asked Questions

    Can I borrow money without a credit check?

    Yes, many online lenders such as HonestLoans offer loans based on your income rather than your credit score.

    Which loan does not require a credit check?

    Payday loans, cash advances, and certain personal installment loans typically don’t involve a credit check.

    How to get instant loan 50000 with low CIBIL score?

    Try to apply with lenders who consider income over credit history or opt for secured loans like HonestLoans.

    What is the easiest loan to get with no credit?

    Cash loans or payday loans are typically the quickest if you have no credit history.

    How can I get a loan in 1 hour?

    Search for lenders online such as HonestLoans that provide fast approvals and can make transfers in an hour.

    Can I get a loan with a 450 credit score in USA?

    Yes, your best option would be no credit check lenders or those who take other factors into consideration such as your income.

    Media Details:

    www.honestloans.net

    • Company: Honest Loans
    • Phone: 888-718-9134
    • Email: support@onlineloannetwork.com

    Attachment

    The MIL Network

  • MIL-OSI Economics: Phillips 66 Updates Preliminary Results on Election of Directors

    Source: Phillips

    Phillips 66 Shareholders Elect Robert W. Pease and Nigel Hearne Phillips 66 Directors as well as Sigmund L. Cornelius and Michael A. Heim Elliott Director Nominees

    HOUSTON–(BUSINESS WIRE)– Phillips 66 (NYSE:PSX) today updated the preliminary results for the election of directors at its annual meeting of shareholders held on May 21, 2025. Based on estimates by the company’s proxy solicitor, shareholders are expected to elect two Phillips 66 nominees and two Elliott Management nominees.
    Based on the preliminary results, the elected Phillips 66 directors are expected to be Robert W. Pease and Nigel Hearne. The Elliott nominees expected to be elected are Sigmund L. Cornelius and Michael A. Heim. Phillips 66 nominees John E. Lowe and Howard Ungerleider were not elected.
    “We welcome our new directors and look forward to working constructively as a Board,” said Mark Lashier, Chairman and Chief Executive Officer of Phillips 66. “We thank all our shareholders for their engagement through this process and their careful analysis of the issues. This vote reflects a belief in our integrated strategy and a recognition that our early results do not yet reflect the full potential of our plan or the value inherent in this business. As a Board, we are focused on creating meaningful long-term value for our shareholders.”
    Lashier continued, “On behalf of the Board and Company, I would like to thank John for his service with distinction and Howard for his commitment to this process. They each deserve significant appreciation for their terrific service to the company.”
    The company also noted that, based on estimates by the company’s proxy solicitor, the management proposal to declassify the Board was not approved by shareholders. While it received significant support, it did not receive the required affirmative vote of the holders of 80% of the outstanding shares of stock entitled to vote. The Board recognizes shareholder preference for annual elections and remains committed to declassification. Shareholders overwhelmingly voted against Elliott’s proposal requiring annual director resignations, in line with the Board’s recommendation.
    The results announced today are considered preliminary until final results are tabulated and certified by the independent Inspector of Election. Final results will be reported on a Form 8-K that will be filed with the Securities and Exchange Commission.
    About Phillips 66
    Phillips 66 (NYSE: PSX) is a leading integrated downstream energy provider that manufactures, transports and markets products that drive the global economy. The company’s portfolio includes Midstream, Chemicals, Refining, Marketing and Specialties, and Renewable Fuels businesses. Headquartered in Houston, Phillips 66 has employees around the globe who are committed to safely and reliably providing energy and improving lives while pursuing a lower-carbon future. For more information, visit phillips66.com or follow @Phillips66Co on LinkedIn.
    Cautionary Statement for the Purposes of the “Safe Harbor” Provisions of the Private Securities Litigation Reform Act of 1995
    This news release contains forward-looking statements within the meaning of the federal securities laws. Words such as “anticipated,” “estimated,” “expected,” “planned,” “scheduled,” “targeted,” “believe,” “continue,” “intend,” “will,” “would,” “objective,” “goal,” “project,” “efforts,” “strategies,” “priorities” and similar expressions that convey the prospective nature of events or outcomes generally indicate forward-looking statements. However, the absence of these words does not mean that a statement is not forward-looking. Forward-looking statements included in this news release are based on management’s expectations, estimates and projections as of the date they are made. These statements are not guarantees of future events or performance, and you should not unduly rely on them as they involve certain risks, uncertainties and assumptions that are difficult to predict. Therefore, actual outcomes and results may differ materially from what is expressed or forecast in such forward-looking statements. Factors that could cause actual results or events to differ materially from those described in the forward-looking statements include: changes in governmental policies relating to NGL, crude oil, natural gas, refined petroleum or renewable fuels products pricing, regulation or taxation, including exports; the company’s ability to timely obtain or maintain permits, including those necessary for capital projects; fluctuations in NGL, crude oil, refined petroleum products, renewable fuels, renewable feedstocks and natural gas prices, and refined product, marketing and petrochemical margins; the effects of any widespread public health crisis and its negative impact on commercial activity and demand for the company’s products; changes to government policies relating to renewable fuels and greenhouse gas emissions that adversely affect programs including the renewable fuel standards program, low carbon fuel standards and tax credits for biofuels; liability resulting from pending or future litigation or other legal proceedings; liability for remedial actions, including removal and reclamation obligations under environmental regulations; unexpected changes in costs or technical requirements for constructing, modifying or operating the company’s facilities or transporting its products; the company’s ability to successfully complete, or any material delay in the completion of, any asset disposition, acquisition, shutdown or conversion that it may pursue, including receipt of any necessary regulatory approvals or permits related thereto; unexpected technological or commercial difficulties in manufacturing, refining or transporting the company’s products, including chemical products; the level and success of producers’ drilling plans and the amount and quality of production volumes around the company’s midstream assets; risks and uncertainties with respect to the actions of actual or potential competitive suppliers and transporters of refined petroleum products, renewable fuels or specialty products; changes in the cost or availability of adequate and reliable transportation for the company’s NGL, crude oil, natural gas and refined petroleum or renewable fuels products; failure to complete definitive agreements and feasibility studies for, and to complete construction of, announced and future capital projects on time or within budget; the company’s ability to comply with governmental regulations or make capital expenditures to maintain compliance; limited access to capital or significantly higher cost of capital related to the company’s credit profile or illiquidity or uncertainty in the domestic or international financial markets; damage to the company’s facilities due to accidents, weather and climate events, civil unrest, insurrections, political events, terrorism or cyberattacks; domestic and international economic and political developments including armed hostilities, such as the war in Eastern Europe, instability in the financial services and banking sector, excess inflation, expropriation of assets and changes in fiscal policy, including interest rates; international monetary conditions and exchange controls; changes in estimates or projections used to assess fair value of intangible assets, goodwill and properties, plants and equipment and/or strategic decisions or other developments with respect to the company’s asset portfolio that cause impairment charges; substantial investments required, or reduced demand for products, as a result of existing or future environmental rules and regulations, including greenhouse gas emissions reductions and reduced consumer demand for refined petroleum products; changes in tax, environmental and other laws and regulations (including alternative energy mandates) applicable to the company’s business; political and societal concerns about climate change that could result in changes to the company’s business or increase expenditures, including litigation-related expenses; the operation, financing and distribution decisions of joint ventures that the company does not control; the potential impact of activist shareholder actions or tactics; and other economic, business, competitive and/or regulatory factors affecting the company’s businesses generally as set forth in Phillips 66’s filings with the Securities and Exchange Commission. Phillips 66 is under no obligation (and expressly disclaims any such obligation) to update or alter its forward-looking statements, whether as a result of new information, future events or otherwise.

    Source: Phillips 66

    MIL OSI Economics

  • MIL-OSI USA: ICYMI: Padilla, Colleagues Highlight Consequences of Senate Republicans’ Attempt to Abuse the CRA and Revoke California’s Clean Air Act Waivers

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)

    ICYMI: Padilla, Colleagues Highlight Consequences of Senate Republicans’ Attempt to Abuse the CRA and Revoke California’s Clean Air Act Waivers

    WASHINGTON, D.C. — Today, U.S. Senator Alex Padilla (D-Calif.), Ranking Member of the Senate Committee on Rules and Administration and a member of the Senate Environment and Public Works Committee, highlighted the growing opposition to Republicans’ shortsighted attempts to rescind California’s clean air waivers by going nuclear on the rules and overruling the nonpartisan Senate Parliamentarian’s decision. Senator Padilla, U.S. Senate Democratic Leader Chuck Schumer (D-N.Y.), and U.S. Senator Sheldon Whitehouse (D-R.I.), Ranking Member of the Senate Committee on Environment and Public Works, held the floor yesterday after Majority Leader John Thune (R-S.D.) said that he would move forward this week with a cynical attempt to rescind California’s Clean Air Act waivers with a 50-vote threshold under the Congressional Review Act (CRA), bypassing the filibuster and its 60-vote requirement by overruling the Senate Parliamentarian.

    Senators Padilla, Schumer, Whitehouse, Martin Heinrich (D-N.M.), Ron Wyden (D-Ore.), Adam Schiff (D-Calif.), and Edward J. Markey (D-Mass.) all came out strongly against this reckless effort.

    In a joint statement, Padilla, Schumer, and Whitehouse condemned the attacks on California’s Clean Air Act waivers:

    Padilla, Schumer, Whitehouse Joint Statement Warning Senate Republicans Against Overruling Parliamentarian On Clean Air Act Waivers

    “Let us be abundantly clear: if Republicans throw away the rulebook and overrule the Parliamentarian, that would be going nuclear — plain and simple. This move will harm public health and deteriorate air quality for millions of children and people across the country.  

    “Republicans are overruling a thirty-year tradition of state policies that bolstered a new sector of the economy, helped domestic automakers fend off China’s manufacturing dominance, improved the quality of the air we breathe, reduced planet-warming carbon pollution, and protected the health of American families.  Instead of negotiating changes with the states involved, the fossil fuel industry deployed its political operatives in Congress to go nuclear for them.

    “If the Trump Administration’s scheme to weaponize the CRA goes forward, the executive branch will control the Senate Floor. Senate Republicans are doing an about face on the filibuster — throwing it aside the first moment it’s convenient and the Senate Floor will not be the same.”

    Last night, Padilla, Schumer, and Whitehouse took to the Senate Floor to ask a series of parliamentary inquiries on Senate Republicans’ intention to go nuclear on the California waiver CRAs. Senate Democrats confirmed — on the congressional record — that the Republicans’ plan to move forward would be against the Parliamentarian’s guidance, and thus, the very definition of eliminating the filibuster and going nuclear. The Senators’ remarks and the Presiding Officer’s responses on behalf of the Senate Parliamentarian can be viewed here, and a transcript of the remarks is available here. 

    Senator Martin Heinrich, Ranking Member of the Senate Energy and Natural Resources Committee, issued a statement emphasizing that once Republicans embrace this significant reversal of precedent and attempt to overturn California’s Clean Air Act waivers, a future Democratic Administration could try to reverse Republicans’ oil and gas priorities, including liquified natural gas (LNG) export terminals.

    Heinrich Statement Blasting Senate Republicans’ Plans to Defy the Senate Parliamentarian & Force a Vote to Overturn California’s Clean Energy Air Act Waivers

    “If Senate Republicans force a vote on the California Clean Air Act Waivers, they set a precedent that will allow Congress to overturn nearly any agency decision nationwide. I urge my colleagues to reject this gross overreach. If they don’t, Congressional Review Act resolutions will quickly hijack the Senate floor to retroactively invalidate agency permits, adjudications, and licensing decisions – actions that were never previously considered ‘rules.’

    “We need a reliable energy permitting and approval system if we are going to meet our growing energy needs. But under Republicans’ proposal, Congress could invalidate permits for new oil and gas wells, established rights of way for transmission lines, and approvals of new LNG export terminals. That includes the Department of Energy’s recent approval of Commonwealth LNG’s application to export liquified natural gas. If not challenged immediately, a future administration could also submit Commonwealth’s authorization as a rule retroactively and halt the project years after it has begun construction.

    “By opening this door, Republicans threaten to destroy our permitting and regulatory system, leading to higher energy costs for Americans and making it impossible for new developments to come online. Indeed, nearly every major and minor project the federal government touches could be stalled, creating significant uncertainty if not complete chaos. That is not what the American people want, and it cannot be what Senate Republicans want, either.”

    Senator Wyden, Ranking Member of the Senate Finance Committee, warned Republicans against overruling the Senate Parliamentarian and abusing the Congressional Review Act to meddle with California’s clean air policies. He said the Republican plan would backfire if they follow through.

    Wyden Warns Republicans that Overruling Parliamentarian to Nix California Clean Air Waiver Will Backfire

    “Republicans should think twice before moving ahead with this unprecedented overreach. If they invoke this nuclear option now, they should expect that a future Democratic government will have to revisit decades worth of paltry corporate settlements, deferred prosecution agreements, and tax rulings that were overly favorable to multinationals and ultra-wealthy individuals. That would only be the beginning. These partisan actions cut both ways.”

    Senator Schiff delivered remarks on the Senate floor urging Senate Republicans to consider the implications their decision to throw out the Senate Parliamentarian’s ruling will have on their states if they use the CRA against California’s waivers. 

    WATCH: Sen. Schiff Slams Senate Republicans’ Attempts to Go Nuclear on California’s Clean Air Waivers on the Senate Floor

    “I urge my colleagues, and the American people, not be distracted by suggestions that nothing is going on here, nothing new is going on here, no precedent is being set here. Because it is.”

    “This week’s vote is short-sighted because it’s going to have devastating impacts for our nation’s health, but it’s more than that. And it should send a chill down the spine of legislators in every state and communities across the country, regardless of their political affiliation because the Senate is now setting a new standard, and one that will haunt us in the future. And it will haunt those states whose Senators vote to go down this path. Make no mistake. Today, it is California and our ability to set our own air quality standards. 

    “But tomorrow, it can be your own state’s priorities made into a target by this vote to open the Pandora’s Box of the Congressional Review Act.”

    Senator Markey criticized Republicans’ attempt to change the Senate rules to overturn California’s waivers, both because it reverses California’s clean air progress and because it violates longstanding Senate rules.

    As Senate Republicans Consider Procedural Power Grab, Markey Highlights Seriousness of the Moment

    “At a moment when Donald Trump is actively undermining the checks and balances enshrined in our Constitution, Senate Republicans are moving ahead with a dangerous change to Senate rules while rolling back clean air regulations. 

    “It’s not enough for Republicans to promote chaos and conflict in our economy for the sake of billionaires, they now want to create chaos and conflict in Congress by intentionally trashing guardrails and decisions that protect all members. They don’t care about the rule of law, and they don’t seem to care about the rule of Congress. With this action, Senate Republicans are opening the door for future votes on the countless unlawful and unethical actions carried out by the Trump administration. There will be no putting the genie back in the bottle.”

    Senator Padilla has been outspoken in pushing back against Republican attacks on California’s Clean Air Act waivers. Yesterday, Padilla placed a hold on the four pending EPA nominees until Republicans stop their reckless attempts to overrule the Senate Parliamentarian. Earlier this month, Senators Padilla, Schiff, and Whitehouse took to the Senate floor to sound the alarm on Senate Republicans’ consideration of moving forward with their plan to revoke California’s Clean Air Act waivers. Padilla, Whitehouse, and Schumer also led Democratic Ranking Members in strongly warning Majority Leader Thune and Majority Whip John Barrasso (R-Wyo.) of the dangerous and irreparable consequences if Senate Republicans overrule the Senate Parliamentarian’s decision on California’s waivers.

    Last month, Senators Padilla, Whitehouse, and Schiff welcomed the Senate Parliamentarian’s decision that the waivers are not subject to the CRA. Padilla also joined Whitehouse and Schiff in blasting Trump and EPA Administrator Lee Zeldin’s weaponization of the EPA after the Government Accountability Office’s (GAO) similar finding. Padilla and Schiff previously slammed the Trump Administration’s intent to roll back dozens of the EPA’s regulations that protect California’s air and water.

    MIL OSI USA News

  • MIL-OSI United Kingdom: Greens welcome apparent U-turn from government on winter fuel payments

    Source: Green Party of England and Wales

    Reacting to comments in the Commons today in which Keir Starmer said he wanted to ensure more pensioners are eligible for winter fuel payments, Sian Berry MP said:

    “The Prime Minister’s statement shows just how much pressure he is now under, from the public, Greens and others in opposition, and many Labour MPs, to demonstrate he has at least some understanding that his Government’s cuts are hurting people.

    “To truly right these many wrongs, the Chancellor must try harder, and use her upcoming fiscal decisions to tax extreme wealth fairly. This could not only restore payments in full to the millions of pensioners Labour has betrayed, but also enable her to reconsider other cruel political choices, including £5 billion in cuts to welfare and her refusal to cancel the two-child benefit cap.

    “Together, these u-turns would save hundreds of thousands from being pushed into poverty, and Greens will be making the case for this alongside everyone affected until this Government does the right thing.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Government Taskforce meets on Merseyside to bolster nation’s flood resilience

    Source: United Kingdom – Executive Government & Departments

    Press release

    Government Taskforce meets on Merseyside to bolster nation’s flood resilience

    Flood response capabilities on display at Merseyside fire base

    The third meeting of the Government’s national Floods Resilience Taskforce convened in Aintree today

    Bolstering the nation’s resilience to flooding, including in Merseyside, was top of the agenda as the Government’s national Floods Resilience Taskforce convened in Aintree today (Wednesday 21 May).  

    The meeting was chaired by Floods Minister Emma Hardy and hosted by Mersey Fire and Rescue Service at their National Resilience Centre of Excellence, one of the UK’s most advanced emergency service training facilities, used to co-ordinate national responses to large scale incidents and provide firefighters with the necessary training and skills to respond to events such as severe flooding.  

    The Government inherited the nation’s flood defences in their worst condition on record. To ensure the country is protected from the devastating impacts of flooding, more than 1,000 flood defences will be built or repaired through the Plan for Change as part of a record £2.65 billion two-year investment. 

    Today’s Taskforce meeting brought together partners including Defra, Cabinet Office, the Ministry for Housing, Communities and Local Government, the Environment Agency, the Met Office, Local Resilience Forums, Mayoral Offices, emergency responders, the National Farmers Union, and environmental interest groups. 

    Floods Minister Emma Hardy said:

    The role of any government is to protect its citizens. Having inherited flood defences in disrepair, we are bringing together valued partners through our Floods Resilience Taskforce here in Aintree as we look to speed up and co-ordinate flood preparation and resilience. 

    Through our Plan for Change, we’re investing a record £2.65 billion to repair and build more than 1,000 flood defences across the country, protecting tens of thousands of homes and businesses including on Merseyside.

    The group discussed plans to modernise the UK’s system for flood warnings further, stressing the need for users to understand better how it works for effective decision-making, planning and response. The development of a common warnings framework across the UK will enhance the service and support actions to reduce risks to people, property and livelihoods.  

    The Taskforce also confirmed plans to improve the way the government identifies individuals vulnerable to flooding. This includes using the risk vulnerability tool, unveiled last month by the Cabinet Office, which will enable thousands of officials to see how vulnerable particular areas are to risks by mapping real time crisis data such as live weather warnings, alongside demographic statistics. 

    The meeting touched upon the flood recovery framework, which through local authorities in England provides government support in the aftermath of flooding in exceptional circumstances. There was also discussion of the Bellwin scheme, which is used to reimburse local authorities in England for the costs of the actions they take in the immediate aftermath of an emergency or disaster that endangers life or property. It was agreed that further work is required to improve public understanding of flood resilience. 

    Caroline Douglass, Executive Director for Flood and Coastal Risk Management at the Environment Agency, said:

    Protecting communities in England from the devastating impact of flooding is one of our top priorities as climate change brings more extreme weather. 

    By participating in the Floods Resilience Taskforce, we’re ensuring we share information and co-ordinate our approach to bolster protection for thousands of homes and businesses from the dangers of flooding, preventing billions of pounds worth of damages.

    Minister Oppong-Asare, Parliamentary Secretary at the Cabinet Office, said:

    The Flood Resilience Taskforce sits at the heart of our work to protect communities from extreme weather and flooding.  

    Today’s meeting highlighted how digital tools can strengthen our flood response to identify and support those who are most vulnerable to the impacts of flooding.  

    Through the taskforce, we’re continuing to work closely with key partners to keep people, homes, and businesses safe.

    Met Office Services Director Simon Brown said: 

    Our observations show that the UK is getting wetter, we are seeing more days with over 50mm rainfall in autumn months. A warmer, moister atmosphere increases the capacity for deluges of rain, which can result in serious flooding. A recent study looking at the storms through autumn and winter in 2023/24 found climate change increased the amount of rainfall from these storms, making them about 20% more intense. 

    A number of recent Met Office attribution studies have shown that some recent heavy rainfall events in the UK associated with flooding can be linked to human-caused climate change. Since 1998 the UK has seen six of the 10 wettest years on record. Events such as the wettest February on record in 2020, are expected to become more frequent by 2100 due to climate change.

    The Government’s record investment in flood defences includes around £2.5 million in funding for Merseyside across 2024/25 and 2025/26, including £1 million for a flood alleviation scheme to protect communities near the Pool watercourse at Churchtown in Southport.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Source: United Kingdom – Government Statements

    News story

    Joint statement on the launch of a High-Level Panel on Social Protection in Fragile and Conflict Settings

    Joint statement from the Panel co-chairs, Lord Collins of Highbury, Parliamentary Under Secretary of State for Foreign, Commonwealth and Development Affairs and H.E. Salah Ahmed Jama, Deputy Prime Minister, Federal Government of Somalia

    Joint statement:

    “Today marks the first meeting of the High-Level Panel on Social Protection in Fragile and Conflict-Affected Settings. And the beginning of our six-month mandate.

    Nearly three-quarters of the world’s extreme poor live in fragile settings, where crises are lasting longer, forcing more people from their homes, and contributing to migration.

    When floods, cyclones and droughts hit, when conflict breaks out, when economic shocks destroy livelihoods, social protection can provide a first line of defence, an effective locally led solution that enables the most vulnerable people to withstand, survive, recover from crisis and rebuild their lives at home. One that reduces the need for humanitarian response.

    But despite its proven potential, it is often overlooked in the fragile and conflict-affected settings where it is needed most.

    Over the next six months, the Panel will gather and review lessons from across sectors and regions – including through a forthcoming global public enquiry. As co-chairs, our goal is to come up with bold, practical recommendations that can drive meaningful change.”

    Media enquiries

    Email newsdesk@fcdo.gov.uk

    Telephone 020 7008 3100

    Email the FCDO Newsdesk (monitored 24 hours a day) in the first instance, and we will respond as soon as possible.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Reeves must resign over second wave of austerity

    Source: Scottish Greens

    Patrick Harvie calls for UK to take action on Israeli aid blockade

    Israeli forces must urgently allow aid to reach extremely vulnerable children, says Scottish Greens Co-Leader Patrick Harvie MSP, ahead of a Parliamentary committee hearing from aid agencies working in Gaza and the West Bank.

    It comes after warnings yesterday from the United Nations that 14,000 babies could die in Gaza unless extra aid arrived. Israel claims to have ended their 11-week aid blockade of Gaza, but the UN has warned that the aid trucks allowed in so far are just a “drop in the ocean” compared to what Gaza needs.

    Scottish Greens have continually called for the UK & Scottish Governments to end complicity in the war crimes being committed by Israel.

    The Labour UK Government has provided more arms to Israel in three months than the previous three years under Conservative governments, and the SNP Scottish Government have continued to fund arms manufacturers who produce parts for the F-35 fighter jets which have been used by Israel.

    Scottish Greens Co-Leader Patrick Harvie MSP said:

    “The situation in Gaza is unprecedented in modern times, with the world allowing Israel to inflict  collective punishment on a grotesque scale. Aid blockades and genocide are never acceptable yet governments across the West have overlooked Israel’s war crimes.

    “Israeli forces have withheld urgent aid from civilians for over 11 weeks, and despite their claims to be allowing aid into Palestinian territory, we have heard from the front lines that what is being allowed to enter is nowhere near enough.

    “Senior Ministers in the Israeli Government are quite explicit about their intention to destroy Palestinian life in Gaza, and their utter contempt for international law.

    “The UK Labour Government have blood on their hands, they have continued to enable and support Israel’s war crimes throughout this disgraceful campaign. They must now surely end all trade with Israel, and join with other countries to ensure that urgent aid is provided to meet the immediate needs of the people of Gaza.”

    MIL OSI United Kingdom

  • MIL-OSI Africa: Government proposes fuel levy increase

    Source: South Africa News Agency

    For the first time in three years, government has proposed an inflation-linked increase to the general fuel levy.

    “For the 2025/26 fiscal year, this is the only new tax proposal that I am announcing. It means from 4 June this year, the general fuel levy will increase by 16 cents per litre for petrol, and by 15 cents per litre for diesel,” Minister of Finance Enoch Godongwana said on Wednesday, in Parliament.

    The general fuel levy has remained unchanged for the past three years to provide consumers with relief from high fuel price inflation. 

    Re-tabling the 2025 Budget Review, Godongwana said unfortunately, this tax measure alone will not close the fiscal gap over the medium term.

    “The 2026 Budget will therefore need to propose new tax measures, aimed at raising R20 billion. We have allocated an additional R7.5 billion over the medium-term expenditure framework (MTEF), to increase the effectiveness of the South African Revenue Service (SARS) in collecting more revenue.

    “Part of this allocation will be used to increase collections from debts owed to the fiscus. SARS has indicated that this could raise between R20 billion to R50 billion in additional revenue per year,” the Minister said.

    Another part of the additional allocation to SARS will be used to improve modernisation.

    This will include targeting illicit trade in tobacco and other areas, which should boost revenue over the medium term.

    “As SARS utilises this investment to raise additional revenue, which I believe can be at least R35 billion, the R20 billion to close the current revenue gap will not have to be raised through taxes.

    “Madam Speaker, let me call on every South African, be they individuals, small business operators or large corporates, to honour their tax obligations and contribute to building a better and more equitable nation,” the Minister said.

    He thanked all the taxpayers that continue to pay their taxes while emphasising that government does not take taxpayers for granted.

    “As a government, we know that we must earn the taxpayer’s trust every day, by spending public money with care and ensuring that every rand collected is spent on its intended purpose.

    “We recognise the urgent need to do more to achieve this goal. We are not deaf to the public’s concern about wasteful and inefficient expenditure.

    “Our commitment to collect taxes must be matched by better efficiency in how that money is spent. It must be matched by much stricter oversight that quickly identifies problems and provides timely solutions when things go wrong,”  the Minister explained.

    Expansion of the zero-rated basket withdrawn

    Meanwhile, as a result of the withdrawal of the proposed increases in the VAT rate, the expansion of the zero-rated basket, which was included to cushion poorer households from the VAT rate increase, falls away.

    Last month, the Minister requested the Speaker of the National Assembly to maintain the Value-Added Tax (VAT) rate at its current level of 15% , reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.

    “Madam Speaker, compared to the March estimates, tax revenue projections have been revised down by R61.9 billion over the three years. This reflects the reversal of the VAT increase and the much weaker economic outlook.

    “In this difficult environment, it remains vital that we still take actions to increase revenue to protect and bolster frontline services, while expanding infrastructure investments to drive economic activity,” the Minister said. –SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Operation Vulindlela key to economic growth

    Source: South Africa News Agency

    In an ongoing effort to grow the economy, government will continue to implement growth enhancing structural reforms as part of Operation Vulindlela.

    “Madam Speaker, a bigger, faster-growing economy, and the larger fiscal resources that come with it, are the key to building up the fiscal room we need to meet more of our developmental goals,” Minister of Finance, Enoch Godongwana, said on Wednesday during the re-tabling of the 2025 Budget Review, in Parliament.

    Through the first phase of Operation Vulindlela, bold and far-reaching reforms were implemented in the network sectors and the visa regime.

    “As a result, numerous economic bottlenecks have eased, new investments unlocked, and the growth potential of the economy enabled. Yet the economy still faces constraints,” the Minister said.

    Operation Vulindlela is a joint initiative of the Presidency and the National Treasury to accelerate the implementation of structural reforms and support economic recovery. 

    The unit monitors progress and actively supports implementation. Its aim is to fast-track the implementation of high impact reforms, addressing obstacles or delays to ensure execution on policy commitments.

    The first phase of Operation Vulindlela aimed to reduce power cuts, fix the transport system, lower data costs, increase water supply, attract skills and support tourism.

    The second phase of Operation Vulindlela, launched by President Cyril Ramaphosa earlier this month, will not only prioritise new areas for implementation but will also deepen the implementation of current reforms.

    Upcoming reforms will focus on making it easier to find work and hire people – particularly by addressing spatial inequalities, using cities to drive economic activity and improve municipal service delivery.

    The second phase will therefore focus on the following areas:

    • Seeing-through existing reforms in energy, water, logistics and in the visa regime.
    • Improving the performance of local government. This includes professionalising utilities, appointing suitably qualified people to senior positions, and reviewing the local government fiscal framework.
    • Harnessing digital transformation, in order to drive the adoption of digital technologies in government and build digital public infrastructure for use by all South Africans.
    • Addressing the apartheid legacy of spatial inequality. Reforms will include changes to housing policy and accelerating the release of publicly owned land and buildings. This will also entail clearing the backlog of title deeds for affordable housing, and a comprehensive regulatory review aimed at removing barriers to the development of low-cost housing.

    READ I Phase two of Operation Vulindlela to further drive reforms, economic growth

    “Tackling these structural constraints will ensure that impediments to faster growth are removed,” the Minister said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Government programmes do empower inmates – Minister Groenewald

    Source: South Africa News Agency

    Minister of Correctional Services, Dr Pieter Groenewald, says that the country’s Self-Sufficiency and Sustainability Strategic Framework (SSSF) not only creates employment opportunities for offenders in farms, bakeries, gardens, and abattoirs, but also empowers them.

    “Enabling them to produce their own food has not only empowered the offenders but also resulted in considerable savings for the South African government, “ the Minister said. 

    The Minister believes this demonstrates how the United Nations Standard Minimum Rules for the Treatment of Prisoners, known as the Nelson Mandela Rules, can be effectively implemented.

    The Minister believes that this is one of several successful examples demonstrating how the implementation of the Nelson Mandela Rules can lead to transformative outcomes. 

    These outcomes equip offenders with the necessary skills and experiences to become economically independent after their rehabilitation and reintegration into society.
    The Minister spoke at the 34th Session of the United Nations (UN) Commission on Crime Prevention and Criminal Justice (CCPCI) held in Vienna, Austria. 

    This as the international community also celebrated the 10th anniversary of the rules. 

    The revised Nelson Mandela Rules were adopted unanimously in December 2015 by the UN General Assembly and set out the minimum standards for good prison management, including ensuring that the rights of prisoners are respected. 

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Nelson Mandela, who was in prison for 27 years for his activism against apartheid, and the ideals of dignity, justice, and human rights that he stood for.

    In addition, he called for the international community to advance a more just, inclusive, and rehabilitative approach to incarceration. 

    “In light of rising global prison populations, systemic overcrowding, and the urgent need for more humane and effective penal systems, the 10th Anniversary of the Nelson Mandela Rules provides a timely platform to underscore the importance of prison and penal reform.”

    The Minister also took the time to urge world leaders to honour the enduring legacy of President Mandela and the ideals of dignity, justice, and human rights that he stood for.

    He also took the time to acknowledge the commemoration of the 10th Anniversary of the Nelson Mandela Rules at the UN General Assembly High-Level Debate, scheduled for 13 June 2025. 

    The theme of the debate is “A Second Chance: Addressing the Global Prison Challenge.”

    The Minister expressed support for the Bangkok Rules, which complement the Nelson Mandela Rules by addressing the specific needs and circumstances of women in the criminal justice system, requiring gender-sensitive approaches to their treatment and rehabilitation.

    “Together, these two sets of international standards promote a more inclusive, equitable, and human rights–based correctional system that respects the dignity of all individuals,” he explained. 

    He congratulated Japan on successfully adopting the Model Strategies to Reduce Reoffending, which further supports the Nelson Mandela Rules by ensuring that rehabilitation and reintegration principles are effectively realised beyond prison walls.

    “We wish to express our sincere gratitude to the UNODC [United Nations Office on Drugs and Crime] for their efforts in promoting the practical application of the rules and encourage them to continue assisting Member States in seeking innovative ways to address prison management and penal reform.” 

    He concluded his talk by quoting Nelson Mandela, who aptly said, “No one truly knows a nation until one has been inside its jails. A nation should not be judged by how it treats its highest citizens, but its lowest ones.” – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Improving efficiencies in government spending

    Source: South Africa News Agency

    Work is underway to enhance government’s budget process after expenditure reviews identified tens of billions of rands in potential savings from poorly performing or inefficient programmes that can be redirected in future budgets.

    “Going forward, underperforming programmes will be closed as the 2026 Medium-Term Expenditure Framework (MTEF) budget process undergoes redesign,” Finance Minister Enoch Godongwana said on Wednesday, during the re-tabling of the 2025 Budget Review in Parliament.

    In its Budget Overview, National Treasury said if government achieves significant savings from implementing the recommendations of these reviews, it may mitigate the need for additional tax measures in the 2026 Budget.

    Changes to improve the budget process will be implemented over time. 

    These reforms will be designed to strengthen government and institutional commitment to fiscal sustainability, refine budget prioritisation and the functioning of budget structures, and improve data systems and capital budgeting, monitoring and reporting.

    “When an economy underperforms, as ours has over the last decade, it generates less tax revenue, while requiring increased social spending, widening budget deficits and accelerating debt accumulation.

    “To be successful, our strategy of maintaining fiscal discipline, while investing in growth, demands that we prioritise high-impact expenditures. These are expenditures that deliver economic returns, while eliminating inefficiencies, wastage and leakage that too often plague government’s spending,” the Minister said.

    To tackle this, National Treasury has undertaken expenditure reviews, looking at more than R300 billion in government spending since 2013, with the aim of identifying duplications, waste and inefficiencies.

    “We found potential savings of R37.5 billion over time through improved oversight and operational changes through these reviews.

    “New reforms will target infrastructure planning and implementation across provinces and municipalities. A data-driven approach to detect payroll irregularities will replace the more costly method of using censuses,” the Minister said.

    This initiative will cross-reference administrative datasets to identify ghost workers and other anomalies across government departments.

    “Part of the goal of these initiatives is to also remove the regulatory burden on business. To be successful, not just technical solutions are required. Sustained political backing, at the highest levels, is needed to overcome departmental resistance and to protect whistleblowers who expose irregularities and wastage.

    “I am happy to say that this political backing has already come from President Cyril Ramaphosa, Deputy President Paul Mashatile, as well as my Cabinet colleagues.

    “The President has also undertaken to establish a committee between the Presidency and Treasury to identify wasteful, inefficient and underperforming programmes.

    “I call on Ministers, MECs, DGs, HoDs and every official responsible for public funds to embrace these efforts and play their part,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Attaining economic growth must be SA ‘obsession’

    Source: South Africa News Agency

    Global economic developments, including raised tariffs and trade wars, have lowered South Africa’s 2025 economic growth prospects from a predicted 1.9% Gross Domestic Product (GDP) growth in March down to a revised 1.4% in May.

    This is according to Finance Minister Enoch Godongwana who delivered the Budget Speech in Parliament on Wednesday.

    “[Much] has changed since our last appearance in this House. The most troubling changes are the global economic developments which have, in the short space of two months, already had a significant impact on the domestic economic outlook. The global economy is facing heightened trade tensions and elevated policy uncertainty with worrying economic consequences.

    “As a small, open economy, South Africa is dependent on global trade and financial inflows. This makes us particularly exposed to the global economic developments that I have just outlined.

    “As a result, we now estimate real GDP to grow at 1.4% in 2025. This is lower than the 1.9% we projected in March. Over the next two years, we project real GDP growth to rise moderately to 1.6% in 2026 and 1.8% in 2027,” Godongwana said.

    Risks to South Africa’s economic outlook also remain elevated going into the future.

    “These include the worsening global outlook, weaker-than-expected growth in the fourth quarter of 2024, the persistence of logistics constraints and higher borrowing costs.

    “These developments are a vivid reminder that we must urgently turn the tide on our economic prospects and get our fiscal affairs in order,” he said.

    South Africa’s downward revision is not unique with the global economy also reacting to trade tensions.

    “The International Monetary Fund now projects global growth at 2.8% in 2025. This is 0.5 percentage points lower than the January estimate.

    “Similarly, global trade is projected at 1.7% in 2025, which is also much lower than the January estimate. At the same time, inflation expectations are now above central bank targets in many advanced and emerging market economies. And new trade barriers may raise inflation and prolong the cycle of higher interest rates,” he noted.

    With these challenges arising, government’s vision of fostering faster inclusive growth remains anchored on four pillars:

    • Maintaining macroeconomic stability,
    • Implementing structural reforms,
    • Improving state capability, and
    • Accelerating infrastructure investment.

    “Faster, inclusive growth that creates jobs is the only path towards a more prosperous South Africa.

    “Attaining this growth must be our national obsession. We all have a stake and a responsibility to work towards this goal,” Godongawana asserted. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Godongwana relays government spending plans for the medium term

    Source: South Africa News Agency

    Finance Minister Enoch Godongwana has told Parliament that addressing spending pressures to restore “critical frontline services and invest in infrastructure” is key to improving access to services such as health and education.

    It is for this reason, Godongwana revealed, that over the medium term, government spending, excluding interest, will reach at least R6.69 trillion.

    “The provincial education sector baseline over the 2025 MTEF [Medium-Term Expenditure Framework]  is R1.04 trillion, and R9.5 billion will be added over the medium term to keep teachers in classrooms and hire more staff. An additional R10 billion has been added to the baseline as announced during the March 12 budget to expand access to early education is kept unchanged.

    “This will increase the ECD [early childhood development] subsidy from R17 per child per day to R24. The extra funding will also support increased access to ECD for 700,000 more children, up to the age of five years,” the Minister said on Wednesday.

    The budget for the provincial health sector will reach some R845 billion over the medium term to facilitate in part, the employment of hundreds of doctors who have already completed their in-service training. 

    “This budget will be increased by R20.8 billion over three years to employ 800 post-community service doctors and essential goods and services and reduction of accruals. This increase will also assist the sector in addressing personnel budget pressures,” he said.

    Withdrawal of troops

    Godongwana said funding for the deployment of South African National Defence Force (SANDF) troops in the Democratic Republic of the Congo will be reconfigured.

    This in light of the announcement that the troops – who were there as part of the Southern African Development Community Mission in the Democratic Republic of Congo – will be withdrawing from the East African country.

    “[The] R5 billion we had proposed to allocate to the Department of Defence for its participation in the SADC mission in the DRC is reduced. But the allocation for 2025/26 has been increased from R1.8 billion to R3 billion.

    “This will cover the immediate costs of an orderly and safe withdrawal of our troops and mission equipment,” he said.

    The spending allocations for early retirement, allocations for the Passenger Rail Agency of South Africa (PRASA) and the municipal trading entity reforms announced earlier this year remain “but at a slightly lower level than anticipated in the March 12 budget”.

    “The spending choices we are proposing today demonstrate the government’s determination to bolster the state capability needed to deliver quality, reliable and sustainable core services,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Social grant increases remain in place in Budget 3.0

    Source: South Africa News Agency

    Wednesday, May 21, 2025

    Increases to all social grants, barring the Social Relief of Distress (SRD) grant, will not be affected by the re-tabled budget.

    This according to National Treasury’s 2025 Budget Overview released on Wednesday.

    The number of social grant beneficiaries – excluding those receiving the SRD grant – is expected to rise to 19.3 million people by March 2028.

    The grant increases for 2025/26 are as follows:

    • Old age grant will increase from R2185 to R2315
    • War veterans grant will increase from R2205 to R2335
    • Disability grant will go up from R2185 to R2315
    • Foster care grant rises from R1180 to R1250
    • Care dependency grant will increase from R2185 to R2315
    • Child support grant will go up from R530 to R560
    • The grant-in-aid will increase from R530 to R560 

    “The increase in the social grants budget of R1.6 billion in 2025/26 remains. The temporary COVID-19 Social Relief of Distress grant will be extended until 31 March 2026, with R35.2 billion allocated to maintain the current R370 per month per beneficiary, including administration costs,” National Treasury said.

    While delivering the Budget Speech in Parliament on Wednesday, Finance Minister Enoch Godongwana said government is “actively exploring various options to better integrate” the SRD grant with employment opportunities.

    “This includes considering a job-seeker allowance and other measures, as part of the review of Active Labour Market Programmes. 

    “Our goal is to not only provide immediate relief. It is also to create pathways to employment, empowering our citizens to build better futures for themselves and their families,” Godongwana said. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Infrastructure investment aimed at propelling SA’s future

    Source: South Africa News Agency

    Infrastructure investment remains a key component in driving economic growth and government has maintained its R1 trillion allocation for infrastructure investment over the medium term to support this growth.

    This according to Finance Minister Enoch Godongwana, who delivered the Budget Speech in Parliament on Wednesday.

    “[Quality] infrastructure investment expands the productive capacity of the economy and responds to the diverse needs of the citizens. Infrastructure is also a rich source of jobs in construction, engineering, and related industries across a range of skill levels.

    “It is for these reasons that infrastructure is the fourth pillar of the growth strategy, and this budget demonstrates our resolve to change the composition of spending from consumption to investment. Allocations towards capital payments remain the fastest-growing area of spending by economic classification. Public infrastructure spending over three years will exceed the R1 trillion mark,” Godongwana said.

    Spending will focus on “maintaining and repairing existing infrastructure, building new infrastructure, and acquiring equipment and machinery” primarily in transport and logistics, energy and water and sanitation.

    “Of the R402 billion for transport and logistics, R93.1 billion is for the South African National Roads Agency to keep the 24 000-kilometer national road network in active maintenance and rehabilitation. R53.1 billion is for the maintenance and refurbishment of provincial roads.

    “R66.3 billion is allocated to PRASA, out of which R18.2 billion is for the rolling stock fleet renewal programme and R12.3 billion is provisionally allocated for the renewal of the signalling system. The spending will sustain progress in rebuilding the infrastructure to provide affordable commuter rail services. This will enable PRASA to increase passenger trips from 60 million in 2024/25 to 186 million by the end of the MTEF [Medium Term Expenditure Framework] period.

    “The energy sector will invest R219.2 billion on strengthening the electricity supply network, from generation to transmission and distribution. The water and sanitation sector will spend R156.3 billion on expanding our water resource and service infrastructure, including dams, bulk infrastructure to service mines, factories and farms,” Godongwana explained.

    Reforms for private sector participation

    The Minister announced that new regulations for public-private partnerships (PPPs), which were gazetted earlier this year, are expected to take effect next month.

    “These will reduce the procedural complexity of undertaking PPPs, increasing the deal flow and allowing government to leverage its limited resources to fast-track infrastructure provision. The National Treasury has developed enabling guidelines and frameworks to support the new regulations.

    “Specifically, the unsolicited proposals framework will create clear rules for managing proposals from the private sector. And the framework for fiscal commitments and contingent liabilities will strengthen fiscal risk governance. These guidelines and frameworks will be published in the next few weeks,” he said.

    Furthermore, the process of issuing the first infrastructure bonds in 2025/26 remains in place.

    “We are also exploring alternative financing instruments to allow pension funds, commercial banks, development banks and international financial institutions to participate in financing our infrastructure plans.

    “These reforms are how we plan to leverage infrastructure investment to ease supply side constraints to the economy and improve access to social services the people get,” Godongwana said.

    Employment boost

    Meanwhile, in the 2025 Budget Overview, National Treasury said additional funding of some R8.8 billion has been allocated to public employment programmes (PEPs).

    “Although the number of people employed was 16.8 million in the first quarter of 2025, South Africa’s unemployment rate remained very high at 32.9%.

    “Public employment programmes are crucial to address persistently high unemployment,” National Treasury noted.

    Key beneficiaries for the additional funding include:

    • The Department of Basic Education: R5.8 billion for the basic education schools employment initiative.
    • The Department of Sport, Arts and Culture: R350 000 000 for the creative industry stimulus.
    • The Department of Trade, Industry and Competition: R1.3 billion for the Social Employment Fund.

    “In addition, National Treasury and the Presidency, working with other state institutions, have begun a comprehensive review of active labour market programmes, PEPs and the social support system to improve efficiency and effectiveness.

    “With these efforts, government hopes to make significant strides in reducing unemployment,” the overview read. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Ramaphosa, Trump meeting all set for early evening, SA time

    Source: South Africa News Agency

    President Cyril Ramaphosa’s engagement with United States President Donald Trump is expected to get underway at 5:30pm South African time – starting with a welcome of the visiting President at the Oval Office. 

    The Oval Office is the official workspace used exclusively by the President of the U.S. in Washington, D.C.

    The two leaders aim to rebuild and strengthen their relations amid ongoing tensions, including the recent resettlement of white Afrikaners in America.

    According to The Presidency of SA,  President Trump is set to welcome South Africa’s Head of State at 5:30pm. This will be followed by President Ramaphosa signing the visitors’ book at 5:35pm.

    At 5:45pm, the two leaders will participate in a working lunch, leading to their bilateral meeting scheduled for 6:45pm, which will include an opportunity for media interaction.

    President Ramaphosa is expected to depart from the White House at 6:30pm.

    Ahead of the meeting this afternoon, the President attended the 2025 Budget Speech virtually.

    The South African delegation to Washington D.C. consists of several Cabinet Ministers, notable business figures, and prominent South Africans.

    Included in the delegation are Minister of International Relations and Cooperation Ronald Lamola, Minister in the Presidency Khumbudzo Ntshavheni, Minister of Trade, Industry and Competition Ebrahim Patel, and Minister of Agriculture John Steenhuisen.

    President Ramaphosa has leveraged President Trump’s passion for golf by inviting South African pro golfers Ernie Els and Retief Goosen to join the trip.

    In addition, the President will be accompanied by Johann Rupert, the Founder of Richemont and Chairman of Remgro.

    The delegation also includes Vice President of Business Unity South Africa (BUSA) Adrian Gore and President of the Congress of South African Trade Unions (COSATU) Zingiswa Losi. 

    They are currently in Washington, D.C. to offer strategic support to President Ramaphosa and the South African delegation.

    Meanwhile, President Trump will be flanked by several key officials during his event. 

    These include Vice President JD Vance, Defence Secretary Pete Hegseth, Commerce Secretary Howard Lutnick, Deputy Secretary of State Christopher Landau, Chief of Staff Susie Wiles, Special Government Employee Elon Musk, and Dr Massad Boulos, who serves as a Senior Advisor for Africa as well as on Arab and Middle Eastern Affairs.

    SAnews reported this morning that discussions will focus on revitalising bilateral relations, rethinking economic cooperation, and exploring new trade and investment opportunities that align with South Africa’s development goals. 

    President Ramaphosa arrived in the United States on Monday, landing at Andrews Air Force Base to a warm reception.  

    A red carpet was laid out, and ceremonial guards held the South African and United States flags as he was escorted to his motorcade, signaling the start of his visit with the honours fitting for a Head of State.

    Upon his arrival at the hotel, he was greeted by the South African delegation and members of the media.

    Since then, he has been engaging with his Ministers, including Mcebisi Jonas, the Special Envoy to the United States and the official representative of the President and the South African government.

    Speaking to the media on Tuesday, the President appeared cheerful and optimistic. 

    He expressed that he was “ready and hopeful” for productive discussions at the Oval Office.

    For the latest coverage on President Ramaphosa’s visit to the United States, follow SAgovnews on X, formerly known as Twitter. – SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI Africa: Minister of Finance to deliver budget 3.0

    Source: South Africa News Agency

    Wednesday, May 21, 2025

    Minister of Finance, Enoch Godongwana, will this afternoon, return to Parliament to re-table the 2025 Budget Review.

    This decision follows the Minister’s recent announcement and subsequent request to the Speaker of the National Assembly to maintain the Value-Added Tax rate at its current level of 15 percent, reversing the previously proposed 0.5 percentage point increase presented in the 12 March budget.

    “The revised budget will adhere to all established technical processes and consultations as set out in the Money Bills and Related Matters Act. This includes formal consultations with the Financial and Fiscal Commission, thorough consultations with all political parties within the Government of National Unity as well as Cabinet approval before presentation to Parliament,” National Treasury said.

    Godongwana will deliver the 2025 Budget Speech during the National Assembly plenary at the Cape Town International Convention Centre at 2pm.

    The National Treasury has worked on a new fiscal framework that will maintain the trajectory toward debt stabilisation, a crucial element in strengthening our public finances.

    This process included:

    1. Revising economic assumptions using the latest available data.
    2. Generating a updated fiscal projects.
    3. Recalculating revenue projections and tax implications.
    4. Determining appropriate borrowing strategies.
    5. Consolidating these elements into a coherent and sustainable fiscal framework.

      SAnews.gov.za

    MIL OSI Africa

  • MIL-OSI United Kingdom: Waste packaging company director pays high price in data fraud

    Source: United Kingdom – Executive Government & Departments

    News story

    Waste packaging company director pays high price in data fraud

    A Birmingham-based director and his company has been ordered to pay a Proceeds of Crime confiscation order, fines and costs totalling £476,995. 

    An officer on inspection duty. Please note the photo is an example of EA’s work not directly from this case.

    This follows an Environment Agency investigation into fraudulent entry of waste packaging data.

    At Birmingham Crown Court on Friday 16 May 2025, Shaobo Qin, a director of EDU Case Ltd, pleaded guilty to fraud by false representation. He was given a 2 year prison sentence suspended for 18 months.

    Qin, age 42, of Sutton Coldfield, West Midlands, was also ordered to pay a Proceeds of Crime confiscation order of £255,057. He must pay within 2 months or face 3 years in prison.

    He was also disqualified as a director for 4 years and ordered to do 200 hours of unpaid work.

    His company, EDU Case Ltd of Portway Road, Rowley Regis, was fined £200,000. The Environment Agency were also awarded £21,995 in investigation costs.

    The court was told Qin’s company was a plastics and recycling exports enterprise.  The offences were discovered by the Environment Agency towards the end of 2022.

    The company, orchestrated by Qin, was deliberately and systematically entering false data on to the Environment Agency’s National Packaging Waste Database (NPWD) for non-existent waste exports.

    This resulted in Qin receiving a benefit for himself and his company in the sum of approx. £255,000. He was arrested on Wednesday 10 January 2024 where he was interviewed by Environment Agency officers.

    EDU Case were accredited to carry out plastic packaging exports and able to issue “evidence” of that activity in the form of tonnage figures on the database.

    This evidence could be bought by businesses who are obliged to account for their plastic packaging waste under the Producer Responsibility Obligations (Packaging Waste) Regulations 2007.

    An audit conducted by Environment Agency officers in 2023 and information following that work identified discrepancies between the amount of waste exported and the amount of evidence issued. 

    The false entries represented nearly two-thirds of the business’ entire trade in 2022 towards the end of that year.

    As part of that audit, a legal notice was served on Qin and the company in September 2023.

    This notice required the production of their evidence of plastic waste exports.  In response, Qin sent a computer memory stick containing his business’ waste export evidence and a letter explaining a large discrepancy, described as an “overclaim.”

    The letter stated that the company had carried out 1,239 metric tonnes of plastic waste exports in 2022, only 453.60 metric was genuine and that the majority of his trading, 785.40 metric tonnes  was ‘a mistake.’

    In sentencing the judge said this was without doubt deliberate offending and pre-planned. There had been a significant undermining of the regulatory regime. 

    He accepted that there had been a guilty plea entered at first opportunity and that money had been put aside to repay the financial benefit made. The company was also fined to mark the seriousness of the offending.

    Sham Singh, Senior Environmental Crime Officer for the Environment Agency, said:

    “This case shows that the Environment Agency will pursue individuals and their enterprises who profit illegally.

    “This was a fraud on a large scale and undermines legitimate business and the investment and economic growth that go with it.

    “We support legitimate businesses and are proactively supporting them by disrupting and stopping the criminal element backed up by the threat of tough enforcement as in this case.

    “If anyone suspects that a company is doing something wrong, please contact the Environment Agency on 0800 80 70 60 or report it anonymously to Crimestoppers on 0800 555 111.”

    The Charges

    Shaobo Qin

    Between 1st January 2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that he claimed EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    EDU Case UK Limited (Company No. 08888722)

    Between 1st January  2022 and 31st January 2023 dishonestly and intending thereby to make a gain for himself or another, or to cause loss to another, or to expose another to the risk of loss, made a false representation to the online National Packaging Waste Database which was and which he knew was, or might be, untrue or misleading, namely, that the 785.4 tonnes of plastic waste that EDU Case UK Ltd had exported over that period, had all actually been exported when it had not, contrary to Sections 1 and 2 of the Fraud Act 2006.

    Background Information

    The Packaging Producer Responsibility Regulations were introduced to oblige the producers of waste packaging such as plastic, glass and cardboard (e.g. supermarkets) to contribute towards the financial cost of recycling and the disposal of waste. Any large organisation that meets the criteria for this obligation is required to prove they have made such financial contributions by the purchasing of credits known as Packaging Recovery Notes (PRNs) or Packaging Export Recovery Notes (PERNs) from UK waste reprocessors and waste exporters.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI Security: Russian GRU Targeting Western Logistics Entities and Technology Companies

    Source: US Department of Homeland Security

    Executive Summary

    This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

    Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

    This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

    The following authors and co-sealers are releasing this CSA:

    • United States National Security Agency (NSA)
    • United States Federal Bureau of Investigation (FBI)
    • United Kingdom National Cyber Security Centre (NCSC-UK)
    • Germany Federal Intelligence Service (BND) Bundesnachrichtendienst
    • Germany Federal Office for Information Security (BSI) Bundesamt für Sicherheit in der Informationstechnik
    • Germany Federal Office for the Protection of the Constitution (BfV) Bundesamt für Verfassungsschutz
    • Czech Republic Military Intelligence (VZ)  Vojenské zpravodajství
    • Czech Republic National Cyber and Information Security Agency (NÚKIB) Národní úřad pro kybernetickou a informační bezpečnost
    • Czech Republic Security Information Service (BIS) Bezpečnostní informační služba
    • Poland Internal Security Agency (ABW) Agencja Bezpieczeństwa Wewnętrznego
    • Poland Military Counterintelligence Service (SKW) Służba Kontrwywiadu Wojskowego
    • United States Cybersecurity and Infrastructure Security Agency (CISA)
    • United States Department of Defense Cyber Crime Center (DC3)
    • United States Cyber Command (USCYBERCOM)
    • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    • Canadian Centre for Cyber Security (CCCS)
    • Danish Defence Intelligence Service (DDIS) Forsvarets Efterretningstjeneste
    • Estonian Foreign Intelligence Service (EFIS) Välisluureamet
    • Estonian National Cyber Security Centre (NCSC-EE) Küberturvalisuse keskus
    • French Cybersecurity Agency (ANSSI) Agence nationale de la sécurité des systèmes d’information
    • Netherlands Defence Intelligence and Security Service (MIVD) Militaire Inlichtingen- en Veiligheidsdienst
       

    Download the PDF version of this report:

    Russian GRU Targeting Western Logistics Entities and Technology Companies (PDF, 1,081KB)

    For a downloadable list of IOCs, visit:

    Introduction

    For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.
    In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [1] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.
    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 17. See Appendix A: MITRE ATT&CK tactics and techniques for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.

    Description of Targets

    The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations: 

    •  Defense Industry
    • Transportation and Transportation Hubs (ports, airports, etc.)
    • Maritime
    • Air Traffic Management
    • IT Services

    In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [T1199].

    The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [TA0043].

    The countries with targeted entities include the following, as illustrated in Figure 1:

    • Bulgaria
    • Czech Republic
    • France
    • Germany
    • Greece
    • Italy
    • Moldova
    • Netherlands
    • Poland
    • Romania
    • Slovakia
    • Ukraine
    • United States
       
    Figure 1: Countries with Targeted Entities

    Initial Access TTPs

    To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):

    The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [T1665]. [2]

    Credential Guessing/Brute Force

    Unit 26165 actors’ credential guessing [T1110.001] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.” [3] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [T1090.003]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [T1573]. 

    Spearphishing

    GRU unit 26165 actors’ spearphishing emails included links [T1566.002] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [T1586.002, T1586.003]. The emails were typically written in the target’s native language and sent to a single targeted recipient. 

    Some campaigns employed multi-stage redirectors [T1104] verifying IP-geolocation [T1627.001] and browser fingerprints [T1627] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [T1111] and CAPTCHA relaying capabilities [T1056]. Connecting endpoints failing the location checks were redirected to a benign URL [T1627], such as msn.com. Redirector services used include:

    • Webhook[.]site
    • FrgeIO
    • InfinityFree
    • Dynu
    • Mocky
    • Pipedream
    • Mockbin[.]org

    The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [T1204.002] delivered via third-party services and redirectors [T1566.002], scripts in a mix of languages [T1059] (including BAT [T1059.003] and VBScript [T1059.005]) and links to hosted shortcuts [T1204.001].

    CVE Usage

    Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (CVE-2023-23397) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [T1187]. [4],[5] These actors also used a series of Roundcube CVEs (CVE-2020-12641, CVE-2020-35730, and CVE-2021-44026) to execute arbitrary shell commands [T1059], gain access to victim email accounts, and retrieve sensitive data from email servers [T1114].

    Since at least fall 2023, the actors leveraged a WinRAR vulnerability (CVE-2023-38831) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [T1659]. The actors sent emails with malicious attachments [T1566.001] or embedded hyperlinks [T1566.002] that downloaded a malicious archive prepared using this CVE. 

    Post-Compromise TTPs

    After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [T1589.002]. The actors also conducted reconnaissance of the cybersecurity department [T1591], individuals responsible for coordinating transport [T1591.004], and other companies cooperating with the victim entity [T1591.002].

    The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [TA0008]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [T1021.001] to access additional hosts and attempt to dump Active Directory NTDS.dit domain databases [T1003.003] using native Active Directory Domain Services commands, such as in Figure 2: Example Active Directory Domain Services command:

    C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit

    Figure 2: Example Active Directory Domain Services command

    Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [T1059.006] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [T1560]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [T1048].

    Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [T1098.002] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [6]

    After initial authentication, unit 26165 actors would change accounts’ folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [T1556.006]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [T1552.006] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [T1087.002] and conduct a brute force password spray [T1110.003] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [T1070.001].

    After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including: 

    • sender,
    • recipient,
    • train/plane/ship numbers,
    • point of departure,
    • destination,
    • container registration numbers,
    • travel route, and
    • cargo contents. 

    In at least one instance, the actors attempted to use voice phishing [T1566.004] to gain access to privileged accounts by impersonating IT staff.

    Malware

    Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [T1574.001] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:

    • HEADLACE [7]
    • MASEPIE [8]

    While other malware variants, such as OCEANMAP and STEELHOOK, [8] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise. 

    Persistence

    In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [T1053.005], run keys [T1547.001], and placed malicious shortcuts [T1547.009] in the startup folder to establish persistence. 

    Exfiltration

    GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [T1059.001] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [T1560.001] for upload to their own infrastructure. 

    The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [T1114.002] to exfiltrate data from email servers. In multiple instances, the actors used periodic EWS queries [T1119] to collect new emails sent and received since the last data exfiltration [T1029]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected. 

    Connections to Targeting of IP Cameras

    In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams. 

    The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [T1592] and gain access to the cameras’ feeds [T1125]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [T1090.002]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [T1110]. An example of an RTSP request is shown in Figure 3.

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 1

    Authorization: Basic

    User-Agent: WebClient

    Accept: application/sdp

    DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0

    CSeq: 2

    Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"

    User-Agent: WebClient

    Accept: application/sdp

    Figure 3: Example RTSP request

    Successful RTSP 200 OK responses contained a snapshot of the IP camera’s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera’s configuration. 

    From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in Table 1:

    Table 1: Geographic distribution of targeted IP cameras
    Country Percentage of Total Attempts
    Ukraine 81.0%
    Romania 9.9%
    Poland 4.0%
    Hungary 2.8%
    Slovakia 1.7%
    Others 0.6%

    Mitigation Actions

    General Security Mitigations

    Architecture and Configuration

    • Employ appropriate network segmentation [D3-NI] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [D3-AMED].
      • Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [9]
    • Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [D3-ITF]. Alert on attempts to connect laterally between host devices or other unusual data flows.
    • Use automated tools to audit access logs for security concerns and identify anomalous access requests [D3-RAPA].
    • For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [D3-OTF].
    • Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [D3-PM] first.
      • Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.
    • Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [D3-SFA].
    • Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [D3-AH]:
      • Enable attack surface reduction rules to prevent executable content from email [D3-ABPI].
      • Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [D3-EAL].
      • Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [10]) to known scripts [D3-EI], and audit execution attempts.
      • Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [D3-ACH].
    • Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default [D3-EAL].
    • Consider using open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters [D3-PSA].
    • Use services that provide enhanced browsing services and safe link checking [D3-URA]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.
    • Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [D3-NAM].
    • Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.

    Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [D3-DNSDL].

    • *.000[.]pe
    • *.1cooldns[.]com
    • *.42web[.]io
    • *.4cloud[.]click
    • *.accesscan[.]org
    • *.bumbleshrimp[.]com
    • *.camdvr[.]org
    • *.casacam[.]net
    • *.ddnsfree[.]com
    • *.ddnsgeek[.]com
    • *.ddnsguru[.]com
    • *.dynuddns[.]com
    • *.dynuddns[.]net
    • *.free[.]nf
    • *.freeddns[.]org
    • *.frge[.]io
    • *.glize[.]com
    • *.great-site[.]net
    • *.infinityfreeapp[.]com
    • *.kesug[.]com
    • *.loseyourip[.]com
    • *.lovestoblog[.]com
    • *.mockbin[.]io
    • *.mockbin[.]org
    • *.mocky[.]io
    • *.mybiolink[.]io
    • *.mysynology[.]net
    • *.mywire[.]org
    • *.ngrok[.]io
    • *.ooguy[.]com
    • *.pipedream[.]net
    • *.rf[.]gd
    • *.urlbae[.]com
    • *.webhook[.]site
    • *.webhookapp[.]com
    • *.webredirect[.]org
    • *.wuaze[.]com

    Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [D3-DNRA]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.

    Identity and Access Management

    Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques: 

    • Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [D3-MFA]. [11], [12] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.
    • Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [D3-JFAPA].
    • Separate privileged accounts by role and alert on misuse of privileged accounts [D3-UAP]. For example, email administrator accounts should be different from domain administrator accounts.
    • Reduce reliance on passwords; instead, consider using services like single sign-on [D3-TBA].
      • For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.
    • Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [D3-CH]. [13]
    • Use account throttling or account lockout [D3-ANET]:
      • Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.
      • Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.
      • Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).
      • If using lockout, then allowing 5 to 10 attempts before lockout is recommended.
    • Use a service to check for compromised passwords before using them [D3-SPP]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.
    • Change all default credentials [D3-CRO] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [D3-ACH] [D3-ET]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [13]

    IP Camera Mitigations

    The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:

    • Ensure IP cameras are currently supported. Replace devices that are out of support.
    • Apply security patches and firmware updates to all IP cameras [D3-SU].
    • Disable remote access to the IP camera, if unnecessary [D3-ITF].
    • Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [D3-NAM].
    • If remote access to IP camera feeds is required, ensure authentication is enabled [D3-AA] and use a VPN to connect remotely [D3-ET]. Use MFA for management accounts if supported [D3-MFA].
    • Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [D3-NI].
    • Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [D3-ACH].
    • If supported, enable authenticated RTSP access only [D3-AA].
    • Review all authentication activity for remote access to make sure it is valid and expected [D3-UBA]. Investigate any unexpected or unusual activity.
    • Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [D3-UAP].
    • Configure, tune, and monitor logging—if available—on the IP camera.

    Indicators of Compromise (IOCs)

    Note: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.

    Utilities and scripts

    Legitimate utilities

    Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:

    • ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory
    • wevtutil – A legitimate Windows executable used by threat actors to delete event logs
    • vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive
    • ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services
    • OpenSSH – The Windows version of a legitimate open source SSH client
    • schtasks – A legitimate Windows executable used to create persistence using scheduled tasks
    • whoami – A legitimate Windows executable used to retrieve the name of the current user
    • tasklist – A legitimate Windows executable used to retrieve the list of running processes
    • hostname – A legitimate Windows executable used to retrieve the device name
    • arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment
    • systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information
    • net – A legitimate Windows executable used to retrieve detailed user information
    • wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives
    • cacls – A legitimate Windows executable used to modify permissions on files
    • icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership
    • ssh – A legitimate Windows executable used to establish network shell connections
    • reg – A legitimate Windows executable used to add to or modify the system registry 

    Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, Identifying and Mitigating Living Off the Land Techniques, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.

    Malicious scripts

    • Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services
    • Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences
    • ldap-dump.py – A script for enumerating user accounts and other information in Active Directory
    • Hikvision backdoor string: “YWRtaW46MTEK”

    Suspicious command lines

    While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:

    • edge.exe “-headless-new -disable-gpu”
    • ntdsutil.exe “activate instance ntds” ifm “create full C:temp[a-z]{3}” quit quit
    • ssh -Nf
    • schtasks /create /xml

    Outlook CVE Exploitation IOCs

    • md-shoeb@alfathdoor[.]com[.]sa
    • jayam@wizzsolutions[.]com
    • accounts@regencyservice[.]in
    • m.salim@tsc-me[.]com
    • vikram.anand@4ginfosource[.]com
    • mdelafuente@ukwwfze[.]com
    • sarah@cosmicgold469[.]co[.]za
    • franch1.lanka@bplanka[.]com
    • commerical@vanadrink[.]com
    • maint@goldenloaduae[.]com
    • karina@bhpcapital[.]com
    • tv@coastalareabank[.]com
    • ashoke.kumar@hbclife[.]in
    • 213[.]32[.]252[.]221
    • 124[.]168[.]91[.]178
    • 194[.]126[.]178[.]8
    • 159[.]196[.]128[.]120

    Commonly Used Webmail Providers

    • portugalmail[.]pt
    • mail-online[.]dk
    • email[.]cz
    • seznam[.]cz

    Malicious Archive Filenames Involving CVE-2023-38831

    • calc.war.zip
    • news_week_6.zip
    • Roadmap.zip
    • SEDE-PV-2023-10-09-1_EN.zip
    • war.zip
    • Zeyilname.zip

    Brute Forcing IP Addresses

    Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.

    June 2024 July 2024 August 2024
    192[.]162[.]174[.]94 207[.]244[.]71[.]84 31[.]135[.]199[.]145 79[.]184[.]25[.]198 91[.]149[.]253[.]204  
    103[.]97[.]203[.]29 162[.]210[.]194[.]2 31[.]42[.]4[.]138 79[.]185[.]5[.]142 91[.]149[.]254[.]75  
    209[.]14[.]71[.]127   46[.]112[.]70[.]252 83[.]10[.]46[.]174 91[.]149[.]255[.]122  
    109[.]95[.]151[.]207   46[.]248[.]185[.]236 83[.]168[.]66[.]145 91[.]149[.]255[.]19  
        64[.]176[.]67[.]117 83[.]168[.]78[.]27 91[.]149[.]255[.]195  
        64[.]176[.]69[.]196 83[.]168[.]78[.]31   91[.]221[.]88[.]76  
        64[.]176[.]70[.]18 83[.]168[.]78[.]55   93[.]105[.]185[.]139  
        64[.]176[.]70[.]238 83[.]23[.]130[.]49   95[.]215[.]76[.]209  
        64[.]176[.]71[.]201 83[.]29[.]138[.]115   138[.]199[.]59[.]43  
        70[.]34[.]242[.]220 89[.]64[.]70[.]69   147[.]135[.]209[.]245  
        70[.]34[.]243[.]226 90[.]156[.]4[.]204   178[.]235[.]191[.]182  
        70[.]34[.]244[.]100 91[.]149[.]202[.]215   178[.]37[.]97[.]243  
        70[.]34[.]245[.]215 91[.]149[.]203[.]73   185[.]234[.]235[.]69  
        70[.]34[.]252[.]168 91[.]149[.]219[.]158 192[.]162[.]174[.]67  
        70[.]34[.]252[.]186 91[.]149[.]219[.]23   194[.]187[.]180[.]20  
        70[.]34[.]252[.]222 91[.]149[.]223[.]130   212[.]127[.]78[.]170  
        70[.]34[.]253[.]13 91[.]149[.]253[.]118 213[.]134[.]184[.]167
        70[.]34[.]253[.]247   91[.]149[.]253[.]198    
        70[.]34[.]254[.]245 91[.]149[.]253[.]20    

    Detections

    Customized NTLM listener

    rule APT28_NTLM_LISTENER {

           meta:

                  description = "Detects NTLM listeners including APT28's custom one"

           strings:

                  $command_1 = "start-process powershell.exe -WindowStyle hidden"

                  $command_2 = "New-Object System.Net.HttpListener"

                  $command_3 = "Prefixes.Add('http://localhost:8080/')"

                  $command_4 = "-match 'Authorization'"

                  $command_5 = "GetValues('Authorization')"

                  $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"

                  $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"

                  $command_8 = ".AllKeys"

                  

                  $variable_1 = "$NTLMAuthentication" nocase

                  $variable_2 = "$NTLMType2" nocase

                  $variable_3 = "$listener" nocase

                  $variable_4 = "$hostip" nocase

                  $variable_5 = "$request" nocase

                  $variable_6 = "$ntlmt2" nocase

                  $variable_7 = "$NTLMType2Response" nocase

                  $variable_8 = "$buffer" nocase

           condition:

                  5 of ($command_*) 

                  or

                  all of ($variable_*)

    }

    HEADLACE shortcut

    rule APT28_HEADLACE_SHORTCUT {

           meta:

                  description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."

           strings:

                  $type = "[InternetShortcut]" ascii nocase

                  $url  = "file://"

                  $edge = "msedge.exe"

                  $icon = "IconFile"

           condition:

                  all of them

    }

    HEADLACE credential dialogbox phishing 

    rule APT28_HEADLACE_CREDENTIALDIALOG {

           meta:

                  description = "Detects scripts used by APT28 to lure user into entering credentials"

           strings:

                  $command_1 = "while($true)"

                  $command_2 = "Get-Credential $(whoami)"

                  $command_3 = "Add-Content"

                  $command_4 = ".UserName"

                  $command_5 = ".GetNetworkCredential().Password"

                  $command_6 = "GetNetworkCredential().Password.Length -ne 0"

           condition:

                  5 of them

    }

    HEADLACE core script

    rule APT28_HEADLACE_CORE {

           meta:

                  description = "Detects HEADLACE core batch scripts"

           strings:

                  $chcp = "chcp 65001" ascii

                  $headless = "start "" msedge --headless=new --disable-gpu" ascii

                  

                  $command_1 = "taskkill /im msedge.exe /f" ascii

                  $command_2 = "whoami>"%programdata%" ascii

                  $command_3 = "timeout" ascii

                  $command_4 = "copy "%programdata%" ascii

                  $non_generic_del_1 = "del /q /f "%programdata%" ascii

                  $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii

     

                  $generic_del = "del /q /f" ascii

           condition:

                  (

                          $chcp 

                          and 

                          $headless

                  )

                  and

                  (

                          1 of ($non_generic_del_*)

                          or

                          ($generic_del)

                          or

                          3 of ($command_*)

                  )

    }

    MASEPIE

    rule APT28_MASEPIE {

           meta:

                  description = "Detects MASEPIE python script"

           strings:

                  $masepie_unique_1 = "os.popen('whoami').read()"

                  $masepie_unique_2 = "elif message == 'check'"

                  $masepie_unique_3 = "elif message == 'send_file':"

                  $masepie_unique_4 = "elif message == 'get_file'"

                  $masepie_unique_5 = "enc_mes('ok'"

                  $masepie_unique_6 = "Bad command!'.encode('ascii'"

                  $masepie_unique_7 = "{user}{SEPARATOR}{k}"

                  $masepie_unique_8 = "raise Exception("Reconnect"

           condition:

                  3 of ($masepie_unique_*)

    }

    STEELHOOK

    rule APT28_STEELHOOK {

           meta:

                  description = "Detects APT28's STEELHOOK powershell script"

           strings:

                  $s_1 = "$($env:LOCALAPPDATAGoogleChromeUser DataLocal State)"

                  $s_2 = "$($env:LOCALAPPDATAGoogleChromeUser DataDefaultLogin Data)"

                  $s_3 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataLocal State)"

                  $s_4 = "$($env:LOCALAPPDATAMicrosoftEdgeUser DataDefaultLogin Data)"

                  $s_5 = "os_crypt.encrypted_key"

                  $s_6 = "System.Security.Cryptography.DataProtectionScope"

                  $s_7 = "[system.security.cryptography.protectdata]::Unprotect"

                  $s_8 = "Invoke-RestMethod"

           condition:

                  all of them

    }

    PSEXEC

    rule GENERIC_PSEXEC {

           meta:

                  description = "Detects SysInternals PSEXEC executable"

           strings:

                  $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"

                  $sysinternals_2 = "/accepteula"

                  $sysinternals_3 = "SoftwareSysinternals"

                  $network_1 = "%sIPC$"

                  $network_2 = "%sADMIN$%s"

                  $network_3 = "DeviceLanmanRedirector%sipc$"

                  $psexec_1 = "PSEXESVC"

                  $psexec_2 = "PSEXEC-{}-"

                  $psexec_3 = "Copying %s to %s..."

                  $psexec_4 = "gPSINFSVC"

           condition:

                  (

                          ( uint16( 0x0 ) ==0x5a4d )

                          and

                          ( uint16( uint32( 0x3c )) == 0x4550 )

                  )

                  and 

                          filesize < 1024KB

                  and

                  (

                          ( any of ($sysinternals_*) and any of ($psexec_*) )

                          or

                          ( 2 of ($network_*) and 2 of ($psexec_*))

                  )

    }

    The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G0007 and commonly used within the cybersecurity community: 

    • APT28 [14]
    • Fancy Bear [14]
    • Forest Blizzard [14]
    • Blue Delta [15]

    Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.

    Further Reference

    To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft: https://aka.ms/CVE-2023-23397ScriptDoc

    For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:
    https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar

    Works Cited

    [1] Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/  
    [2] FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF   
    [3] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF 
    [4] ANSSI. Campagnes d'attaques du mode opératoire APT28 depuis 2021. 2023. https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/  
    [5] ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/   
    [6] Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/ 
    [7] IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/ 
    [8] CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. https://cert.gov.ua/article/6276894 
    [9] NSA. Embracing a Zero Trust Security Model. 2021. https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF  
    [10] NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF 
    [11] National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. https://pages.nist.gov/800-63-3/sp800-63b.html 
    [12] NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF  
    [13] NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF 

    [14] Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian  
    [15] Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf  
     

    Disclaimer of endorsement

    The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.

    Contact

    United States organizations

    • National Security Agency (NSA)
    • Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)
      • U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center (report@cisa.gov or 888-282-0870), or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
    • Department of Defense Cyber Crime Center (DC3)

    United Kingdom organizations

    Germany organizations

    Czech Republic organizations

    Poland organizations

    Australian organizations

    • Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.

    Canadian organizations

    Estonia organizations

    French organizations

    • French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at cert-fr@ssi.gouv.fr or by phone at: 3218 or +33 9 70 83 32 18. 

    See Table 2 through Table 14 for all the threat actor tactics and techniques referenced in this advisory.

    Table 2: Reconnaissance
    Tactic/Technique Title ID Use
    Reconnaissance TA0043 Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.
    Gather Victim Identity Information: Email Addresses T1589.002 Conducted contact information reconnaissance to identify additional targets in key positions.
    Gather Victim Org Information T1591 Conducted reconnaissance of the cybersecurity department.
    Gather Victim Org Information: Identify Roles T1591.004 Conducted reconnaissance of individuals responsible for coordinating transport.
    Gather Victim Org Information: Business Relationships T1591.002 Conducted reconnaissance of other companies cooperating with the victim entity.
    Gather Victim Host Information T1592 Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.
    Table 3: Resource development
    Tactic/Technique Title ID Use
    Compromise Accounts: Email Accounts T1586.002 Sent phishing emails using compromised accounts.
    Compromise Accounts: Cloud Accounts T1586.003 Sent phishing emails using compromised accounts.
    Table 4: Initial Access
    Tactic/Technique Title ID Use
    Trusted Relationship T1199 Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.
    Phishing T1566 Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.
    Phishing: Spearphishing Attachment T1566.001 Sent emails with malicious attachments.
    Phishing: Spearphishing Link T1566.002 Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.
    Phishing: Spearphishing Voice T1566.004 Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.
    External Remote Services T1133 Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.
    Exploit Public-Facing Application T1190 Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.
    Content Injection T1659 Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.
    Table 5: Execution
    Tactic/Technique Title ID Use
    User Execution: Malicious Link T1204.001 Used malicious links to hosted shortcuts in spearphishing.
    User Execution: Malicious File T1204.002 Delivered malware executables via spearphishing.
    Scheduled Task/Job: Scheduled Task T1053.005 Used scheduled tasks to establish persistence.
    Command and Scripting Interpreter T1059 Delivered scripts in spearphishing. Executed arbitrary shell commands.
    Command and Scripting Interpreter: PowerShell T1059.001 PowerShell commands were often used to prepare data for exfiltration.
    Command and Scripting Interpreter: Windows Command Shell T1059.003 Used BAT script in spearphishing.
    Command and Scripting Interpreter: Visual Basic T1059.005 Used VBScript in spearphishing.
    Command and Scripting Interpreter: Python T1059.006 Installed python on infected machines to enable the execution of Certipy.
    Table 6: Persistence
    Tactic/Technique Title ID Use
    Account Manipulation: 
    Additional Email Delegate 
    Permissions
    Used manipulation of mailbox permissions to establish sustained email collection. 
    Modify Authentication Process: 
    Multi-Factor Authentication
    Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access. 
    Hijack Execution Flow: DLL 
    Search Order Hijacking 
    T1574.001  Used DLL search order hijacking to facilitate malware execution. 
    Boot or Logon Autostart 
    Execution: Registry Run Keys / 
    Startup Folder

    T1547.001 

    Used run keys to establish persistence. 
    Boot or Logon Autostart 
    Execution: Shortcut 
    Modification

    T1547.009 

    Placed malicious shortcuts in the startup folder to establish persistence. 
    Table 7: Defense Evasion
    Tactic/Technique Title ID Use
    Indicator Removal: Clear 
    Windows Event Logs
    T1070.001  Deleted event logs through the wevtutil utility.
    Table 8: Credential access 
    Tactic/Technique Title ID Use

    Brute Force 

    Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices. 

    Brute Force: Password Guessing 

    Used credential guessing to gain initial access to targeted entities. 

    Brute Force: Password Spraying 

    Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP. 

    Multi-Factor Authentication Interception 

    Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns. 

    Input Capture 

    Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns. 

    Forced Authentication 

    Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations. 

    OS Credential Dumping: NTDS 

    Attempted to dump Active Directory NTDS.dit domain databases. 

    Unsecured Credentials: Group Policy Preferences 

    Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py. 

    Table 9: Discovery
    Tactic/Technique Title ID Use

    Account Discovery: Domain Account

    T1087.002

    Used a modified ldap-dump.py to enumerate the Windows environment.

    Table 10: Command and Control
    Tactic/Technique Title ID Use

    Hide Infrastructure 

    T1665 

    Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target. 

    Proxy: External Proxy 

    T1090.002 

    Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers. 

    Proxy: Multi-hop Proxy 

    T1090.003 

    Used Tor and commercial VPNs as part of their anonymization infrastructure 

    Encrypted Channel 

    T1573 

    Connected to victim infrastructure using encrypted TLS. 

    Multi-Stage Channels 

    T1104 

    Used multi-stage redirectors for campaigns. 

    Table 11: Defense evasion (mobile framework)
    Tactic/Technique Title ID Use

    Execution Guardrails 

    Used multi-stage redirectors to verify browser fingerprints in some campaigns. 

    Execution Guardrails: Geofencing 

    Used multi-stage redirectors to verify IP-geolocation in some campaigns. 

    Table 12: Lateral movement
    Tactic/Technique Title ID Use

    Lateral Movement 

    Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment. 

    Remote Services: Remote Desktop Protocol 

    Moved laterally within the network using RDP. 

    Table 13: Collection
    Tactic/Technique Title ID Use

    Email Collection 

    Retrieved sensitive data from email servers. 

    Email Collection: Remote Email Collection 

    Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers. 

    Automated Collection 

    Used periodic EWS queries to collect new emails. 

    Video Capture 

    Attempted to gain access to the cameras’ feeds. 

    Archive Collected Data 

    Accessed files were archived in .zip files prior to exfiltration. 

    Archive Collected Data: Archive via Utility 

    Prepared zip archives for upload to the actors’ infrastructure. 

    Table 14: Exfiltration
    Tactic/Technique Title ID Use

    Exfiltration Over Alternative Protocol 

    Attempted to exfiltrate archived data via a previously dropped OpenSSH binary. 

    Scheduled Transfer 

    Used periodic EWS queries to collect new emails sent and received since the last data exfiltration. 

    Appendix B: CVEs exploited

    Table 15: Exploited CVE information
    CVE  Vendor/Product  Details

    RARLAB WinRAR 

    Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive. 

    Microsoft Outlook 

    External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim. 

    Roundcube Webmail 

    Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params. 

    Roundcube Webmail 

    An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php. 

    Roundcube Webmail 

    Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php. 

    Appendix C: MITRE D3FEND Countermeasures

    Table 16: MITRE D3FEND countermeasures
    Countermeasure Title  ID  Details 

    Network Isolation 

    Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers. 

    Access Mediation 

    Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. 

    Inbound Traffic Filtering 

    Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement. 

    Resource Access Pattern Analysis 

    Use automated tools to audit access logs for security concerns and identify anomalous access requests. 

    Outbound Traffic Filtering 

    Block NTLM/SMB requests to external infrastructure. 

    Platform Monitoring 

    Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers. 

    System File Analysis 

    Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly. 

    Application Hardening 

    Enable optional security features in Windows to harden endpoints and mitigate initial access techniques. 

    Application-based Process Isolation 

    Enable attack surface reduction rules to prevent executable content from email. 

    Executable Allowlisting 

    Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%. 

    Execution Isolation 

    Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts. 

    Application Configuration Hardening 

    Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.). 

    Process Spawn Analysis 

    Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters. 

    URL Reputation Analysis 

    Use services that provide enhanced browsing services and safe link checking. 

    Network Access Mediation 

    Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible. 

    DNS Denylisting 

    Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors. 

    Domain Name Reputation Analysis 

    Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims. 

    Multi-factor Authentication 

    Use MFA with strong factors and require regular re-authentication, especially for management accounts. 

    Job Function Access Pattern Analysis 

    Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts. 

    User Account Permissions 

    Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected. 

    Token-based Authentication 

    Reduce reliance on passwords; instead, consider using services like single sign-on. 

    Credential Hardening 

    Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts. 

    Authentication Event Threshholding 

    Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout. 

    Strong Password Policy 

    Use a service to check for compromised passwords before using them. 

    Credential Rotation 

    Change all default credentials. 

    Encrypted Tunnels 

    Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices. 

    Software Update 

    Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life. 

    Agent Authentication 

    Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only. 

    User Behavior Analysis 

    Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity. 

    MIL Security OSI -

  • MIL-OSI: MEXC Partners with TON for Groundbreaking $1 Million Crypto Event

    Source: GlobeNewswire (MIL-OSI)

    VICTORIA, Seychelles, May 21, 2025 (GLOBE NEWSWIRE) — MEXC, a leading global cryptocurrency exchange, today announced an industry-disrupting partnership with The Open Network (TON) that introduces a $1 million reward pool campaign and fundamentally challenges established exchange revenue models. Launching today and running through June 20, the “TON Triumph” campaign eliminates all trading fees on TON pairs while offering staking returns that dwarf typical yields by up to 100 times.

    In an unprecedented move that signals a significant shift in exchange competition strategies, MEXC will offer new users access to staking opportunities with up to 400% APR on TON tokens—creating what analysts describe as the most aggressive user acquisition campaign in the cryptocurrency exchange sector this year.

    “This partnership represents a strategic inflection point for both the TON ecosystem and the broader exchange landscape,” said Tracy Jin, COO of MEXC. “By eliminating all typical entry costs into TON trading for a full month while simultaneously offering returns that outpace all competitors, we’re not simply running a promotion—we’re fundamentally changing how users engage with emerging Layer-1 ecosystems.”

    Campaign Transforms Market Access and Investment Returns

    The 30-day campaign introduces multiple disruptive elements that directly challenge other exchanges’ TON market dominance:

    • Zero-Fee Trading Structure: Complete elimination of fees on TON/USDT, TON/USDC, and TON/EUR spot pairs, TONUSDT futures, and all TON/USDE network withdrawals—removing traditional revenue mechanisms that have defined exchange business models.
    • Industry-Leading APR: New users can stake TON tokens to earn up to 400% APR, positioning the offering at 100 times higher than typical cryptocurrency staking returns and several hundred times above traditional banking products.
    • Democratized Trading Access: Zero-fee structure gives retail traders access to the same economics previously available only to professional and institutional traders, significantly leveling the playing field.
    • Limited-Time, First-Come Allocation: High-yield staking pools operate on a first-come, first-served basis with participants limited to 250 TON tokens per user, creating immediate urgency for early participation.

    The campaign also includes passive rewards of up to 8% daily APR for USDE holders, spot trading rewards from a pool of 32,500 TON, and a futures trading competition with 100,000 USDT in bonuses.

    TON Ecosystem Expansion and Infrastructure Advancement

    This partnership is pivotal for The Open Network, which continues to gain momentum through its connection to Telegram’s 900+ million users and growing developer ecosystem.

    The collaboration represents a significant leap forward in TON’s accessibility and adoption curve. By drastically reducing barriers to entry while providing exceptional incentives, the campaign accelerates the integration of new participants into the TON ecosystem, coinciding precisely with the network’s rapidly expanding technical capabilities and use cases.

    The campaign also showcases MEXC’s platform capabilities, demonstrating advanced infrastructure that can handle zero-fee trading across multiple markets simultaneously while managing high-volume staking operations with variable APR structures.

    Time-Sensitive Opportunity with Global Access

    The $1 million in rewards is available exclusively during the 30-day window, with certain high-value components like the 400% APR staking pool starting on May 21th and operating on a capped allocation basis.
    MEXC has created a streamlined onboarding process that allows new users to complete registration and KYC verification in minutes, with the campaign accessible to eligible participants globally through both web and mobile interfaces.

    About MEXC
    Founded in 2018, MEXC is committed to being “Your Easiest Way to Crypto.” Serving over 40 million users across 170+ countries, MEXC is known for its broad selection of trending tokens, everyday airdrop opportunities, and low trading fees. Our user-friendly platform is designed to support both new traders and experienced investors, offering secure and efficient access to digital assets. MEXC prioritizes simplicity and innovation, making crypto trading more accessible and rewarding.
    MEXC Official WebsiteXTelegramHow to Sign Up on MEXC

    About TON
    The Open Network (TON) is a fully decentralized layer-1 blockchain designed for mass adoption. Originally conceived by Telegram and now developed by the open TON Community, the network offers exceptional scalability, accessibility, and ease of use.

    Risk Disclaimer:
    The information provided in this article regarding cryptocurrencies does not constitute investment advice. Given the highly volatile nature of the cryptocurrency market, investors are encouraged to carefully assess market fluctuations, the fundamentals of projects, and potential financial risks before making any trading decisions.

    Source

    Contact:
    Lucia Hu
    lucia.hu@mexc.com

    Disclaimer: This is a paid post and is provided by MEXC. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice. Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed. Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/81cfe77f-6144-467b-8410-8e577b84fbb9

    The MIL Network

  • MIL-OSI: TMD Energy Limited Announces Strategic Expansion into Oil Waste Collection as Core ESG Initiative

    Source: GlobeNewswire (MIL-OSI)

    KUALA LUMPUR, MALAYSIA, May 21, 2025 (GLOBE NEWSWIRE) — TMD Energy Limited (the “Company” or “TMDEL”) (NYSE American: TMDE), together with its subsidiaries is a Malaysia and Singapore based services provider engaged in integrated bunkering services which involves ship-to-ship transfer of marine fuels, ship management services and vessel chartering services, today announced a strategic expansion into oil waste collection, marking a significant enhancement of its Environmental, Social, and Governance (ESG) commitments. This initiative aims to collect sludge oil and used cooking oil and sell to third-party partners for processing into biodiesel, which also helps diversify the Company’s revenue streams.

    Following a successful Initial Public Offering, the Company is poised to leverage its extensive logistics network and industry expertise to meet the increasing demand for sustainable waste disposal. It plans to collect residual oils from maritime operators and the food industry, facilitating their conversion into cleaner biodiesel. This circular economy approach not only mitigates greenhouse gas emissions but also supports Malaysia’s national commitment to renewable energy adoption.

    Leadership in Sustainable Innovation

    The biodiesel market in Malaysia, supported by government incentives, presents substantial growth opportunities. TMDEL’s entry into this sector aligns with evolving regulatory frameworks and the corporate demand for eco-conscious partnerships. “Our expansion signifies a strategic shift toward long-term environmental stewardship,” stated Dato’ Sri Kam Choy Ho, Chairman and CEO of the Company. “By collaborating with businesses, agencies and environmental organizations, we aim to redefine waste as a valuable resource—transforming sustainability commitments into actionable and scalable solutions.”

    “This initiative reinforces TMDEL’s dual commitment to operational excellence and ecological responsibility. The Company’s established infrastructure ensures efficient collection, and we target to engage in processing and distribution of biodiesel in the near future, so as to position the Company as a key player in Southeast Asia’s green energy transition.”

    “Furthermore, this milestone underscores our vision to lead the bio-green industry while upholding our commitment to exceptional service standards,” added Dato’ Sri Kam Choy Ho. “Every step forward is a step toward a future where economic growth and environmental responsibility coexist.”

    About TMD Energy Limited

    TMD Energy Limited and its subsidiaries (“TMDEL Group”) are principally involved in marine fuel bunkering services specializing in the supply and marketing of marine gas oil and marine fuel oil of which include high sulfur fuel oil, low sulfur fuel oil and very low sulfur fuel oil, to ships and vessels at sea. TMDEL Group is also involved in the provision of ship management services for in-house and external vessels, as well as vessel chartering. As of today, TMDEL Group operates in 19 ports across Malaysia with a fleet of 15 bunkering vessels. For more information, please visit the Company’s website at: www.tmdel.com.

    Forward-Looking Statements

    Certain statements in this announcement are forward-looking statements, including but not limited to, the Company’s Offering. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs. Investors can identify these forward-looking statements by words or phrases such as “may”, “could”, “will”, “should”, “would”, “expect”, “plan”, “intend”, “anticipate”, “believe”, “estimate”, “predict”, “potential”, “project” or “continue” or the negative of these terms or other comparable terminology. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s financial results filings with the SEC.

    For investor and media inquiries, please contact:
    TMD ENERGY LIMITED
    e-Mail : corporate@tmdel.com

    WFS INVESTOR RELATIONS
    e-Mail : services@wealthfsllc.com

    The MIL Network

  • MIL-OSI United Kingdom: New Chair and members of the Joint Nature Conservation Committee appointed

    Source: United Kingdom – Executive Government & Departments

    News story

    New Chair and members of the Joint Nature Conservation Committee appointed

    Dr David Cooper named as new Chair; Professor Tom Meagher reappointed and Professor Julia Jones confirmed as new member

    Dr David Cooper has been appointed as the Chair of the Joint Nature Conservation Committee (JNCC). The appointment was made in conjunction with the devolved governments and is for a three-year term from 1 June 2025 to 31 May 2028.

    Professor Tom Meagher has been reappointed as an independent member of the Committee. Tom’s term will run for four years until 3 April 2029. 

    Furthermore, Professor Julia Jones has been appointed as an independent member of the Committee. Julia’s term will run for three years until 31 May 2028.

    The new appointments have been made on merit and in accordance with the Governance Code on Public Appointments.

    As the UK’s statutory advisor on nature, the JNCC provides scientific evidence and advice to the devolved governments of the UK, the UK government, and the UK’s Overseas Territories and Crown Dependencies, to help policymakers turn science into action for nature.

    Biographical details

    Dr David Cooper

    • David Cooper is Visiting Fellow at the Oxford Martin School and Honorary Researcher of the Leverhulme Centre for Nature Recovery at the University of Oxford.
    • David has more than 30 years’ experience in international science and policy, including at the Convention on Biological Diversity and the UN Food and Agriculture Organization. As CBD Deputy Executive Secretary and Acting Executive Secretary, he was instrumental in facilitating the development and adoption of the Kunming-Montreal Global Biodiversity Framework and related agreements.
    • David has contributed to the work of the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services among other scientific reports and assessments.
    • He has chaired a number of bodies including the Collaborative Partnership on Sustainable Wildlife Management, the Biodiversity Indicators Partnership, and the Inter-agency liaison group on Invasive Alien Species.

    Professor Tom Meagher

    • Tom Meagher has been a member of the JNCC since April 2021. He is Professor of Plant Biology at the University of St Andrews and served as Director of the St Andrews Global Challenges Forum. He was previously a member of the Defra Science Advisory Council and the Natural Environment Research Council.
    • Tom leads an international and interdisciplinary initiative developing novel remote sensing technology to aid the assessment and conservation of plant biodiversity. He has also worked with the British Council, the British Embassy Lima, and government agencies in Peru to promote the establishment of a national botanic garden and plant biodiversity initiative.
    • He has been an active contributor to the Scottish Government’s environmental and conservation science strategy, following his former role as a Trustee of the Royal Botanic Garden Edinburgh.

    Julia Jones

    • Julia Jones is Professor in Conservation Science at Bangor University and currently holds the Prince Bernhard Chair of International Nature Conservation at Utrecht University.
    • She is a trustee of WWF-UK and is a member of the British Ecological Society and the Society for Conservation Biology. She serves on the advisory board of the Sounds Right initiative, a collaboration between the Museum for the United Nations and the music industry to allow nature to collect royalties from her sounds.
    • She has previously served as the Director of the Low Carbon Energy and Environment Research Network Wales, and on the Welsh committee of the RSPB.

    Updates to this page

    Published 21 May 2025

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: DfE Update: 21 May 2025

    Source: United Kingdom – Executive Government & Departments

    Correspondence

    DfE Update: 21 May 2025

    Latest information and actions from the Department for Education about funding, assurance and resource management, for academies, local authorities and further education providers.

    Applies to England

    Documents

    Details

    Latest for further education

    Article Title
    Action Declare your subcontracting arrangements for the 2024 to 2025 academic year
    Information Adult funding allocations for 2024 to 2025
    Information Release of Apprenticeship funding rules, 2025 to 2026, Version 1
    Information Earnings adjustment statement (EAS)
    Information New foundation apprenticeships available from 1 August 2025
    Reminder Year-end funding claim for 2024 to 2025

    Latest information for academies

    Article Title
    Action Declare your subcontracting arrangements for 2024 to 2025 academic year
    Reminder Year-end funding claim for 2024 to 2025
    Events and webinars ‘Buying for schools’ summer term webinar schedule is open for bookings
    Events and webinars Academy finance professionals June Power Hour – Budget Forecast Return

    Latest information for local authorities

    Article Title
    Action Declare your subcontracting arrangements for 2024 to 2025 academic year
    Information Consistent financial reporting data collection for 2024 to 2025 is now open
    Information Update on early years 2025 summer term data collection
    Information Earnings adjustment statement (EAS)
    Information New foundation apprenticeships available from 1 August 2025
    Reminder Submit your section 151 (S151) officer assurance return and schools financial value standard (SFVS) assurance statement for 2024 to 2025
    Reminder Year-end funding claim for 2024 to 2025
    Events and webinars ‘Buying for schools’ summer term webinar schedule is open for bookings

    Updates to this page

    Published 21 May 2025

    Sign up for emails or print this page

    MIL OSI United Kingdom

  • MIL-OSI Russia: Sobyanin: Another drone attack attempt on Moscow has been thwarted

    Translation. Region: Russian Federal

    Source: Moscow Government – Government of Moscow –

    The Defense Ministry’s air defense forces destroyed another drone flying toward Moscow, Sergei Sobyanin reported on your telegram channel.

    “Emergency services specialists are working at the site of the fallen debris,” the Mayor of Moscow wrote.

    Source: Sergei Sobyanin’s Telegram channel @mos_sobyanin 

    Earlier, the Mayor of Moscow reported that the attack had been repelled three more drones.

    Please note: This information is raw content directly from the source of the information. It is exactly what the source states and does not reflect the position of MIL-OSI or its clients.

    Please Note; This Information is Raw Content Directly from the Information Source. It is access to What the Source Is Stating and Does Not Reflect

    https: //vv.mos.ru/mayor/tkhemes/12731050/

    MIL OSI Russia News

  • MIL-OSI China: China releases plan to protect rivers, lakes

    Source: People’s Republic of China – State Council News

    BEIJING, May 21 — China has unveiled an action plan to protect and create beautiful rivers and lakes from 2025 to 2027, with a focus on improving the quality of aquatic ecosystems.

    The plan, jointly released by the Ministry of Ecology and Environment and other government organs on Wednesday, set the goals of achieving notable progress in creating beautiful rivers and lakes by 2030 and completing the initiative by 2035.

    The plan aims to promote targeted, science-based, and lawful pollution control, coordinate the management of water resources, aquatic environments, and water ecologies, and build an integrated ecological governance system across upstream and downstream areas in key river basins to improve the health of aquatic ecosystems.

    A total of 2,573 water bodies have been included in the national list for protecting and creating beautiful rivers and lakes, covering major river trunks, key tributaries, and important lakes and reservoirs with critical ecological functions, fragile environments, or significant public interest.

    The plan outlines 19 specific measures, focusing on consolidating and deepening water environment management, guaranteeing basic ecological water use, and comprehensively advancing protection and construction efforts.

    MIL OSI China News

  • MIL-OSI Europe: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    Source: Organization for Security and Co-operation in Europe – OSCE

    Headline: Model OSCE in Andorra: Empowering young professionals to engage in peace and security

    From 19 to 21 May, the OSCE Secretariat in collaboration with the Government of Andorra, the US Mission to the OSCE, and University of Andorra co-organized the first-ever Model OSCE in Sant Julià de Lòria, Andorra.
    The three-day event brought together 25 young people with diverse backgrounds from Andorra, Algeria, the United States of America, Japan and Morocco, offering them a unique opportunity to strengthen their soft skills and deepen their understanding of peace and security issues through peer-to-peer learning on multilateralism, international relations and diplomacy.
    The programme featured sessions on the OSCE’s mandate, history, structure, and decision-making processes, as well as its co-operation with OSCE Partners. It also included discussions on Finland’s priorities on 2025 Chairpersonship, the Youth and Security Agenda, the role of women in diplomacy and multilateralism, and hands-on training in negotiation and mediation.
    In her opening remarks, Andorra’s Minister of Foreign Affairs, H.E. Imma Tor Faus emphasized the country’s ongoing support of youth engagement in international affairs: “After hosting the OSCE activities in 2022 focused on Youth and Security, today’s event reaffirms Andorra’s strong and ongoing commitment to the OSCE’s Youth and Security Agenda. We are proud to support the efforts of the Office of the Secretary-General, both politically and financially, to advance this vital work. The Model OSCE reflects the values we stand for and aligns closely with our priority of promoting youth participation in international organizations.”
    Omar Cardentey, Head of Public Affairs for the US. Mission to the OSCE also shared his personal experience in working in the multilateral settings and encouraged young participants to never give up or doubt their ability to make an impact.
    The Model OSCE echoed the motto “nothing about youth without youth”, underscoring the crucial role of young people in building sustainable and peaceful societies.
    One participant, Lisa Cruz Lackner from Andorra, captured the spirit of the event: “Capacity-building initiatives like this are more than trainings. They create a unique space for dialogue, understanding, and mutual learning. When we come together with different experiences, perspectives, and identities, we don’t just learn about the issues—we learn how to listen, negotiate, and collaborate beyond borders. These events empower us not only to understand global challenges, but to see ourselves as part of the solution. In a setting like the Model OSCE, you quickly realize that diversity is not a challenge to overcome—it is the key to building more inclusive, effective and lasting approaches to peace and security.”
    Participants also engaged in exchanges with young diplomats and parliamentarians from Andorra and Malta, gaining firsthand insights into diplomatic careers. The event encouraged collaborative learning and dialogue throughout its session.
    The Model OSCE was held as part of the Extra-budgetary Project “Accelerating the implementation of the Youth and Security Agenda in the OSCE region”, which aims to empower young people to shape a more secure and co-operative future across the OSCE region.

    MIL OSI Europe News

  • MIL-OSI Global: Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star

    Source: The Conversation – Global Perspectives – By Gwen Ansell, Associate of the Gordon Institute for Business Science, University of Pretoria

    We use the term “Renaissance man” very loosely these days, for anybody even slightly multi-talented. But Lesotho-born jazz drummer, novelist and development scholar Morabo Morojele was the genuine article.

    He not only worked across multiple fields, but achieved impressively in all. Morojele died on 20 May, aged 64.

    As a researcher into South African jazz, I encountered him initially through his impressive live performances. I was surprised to hear about his first novel and then – as a teacher of writing – bowled over by its literary power.

    Celebrating a life such as Morojele’s matters, because a pan-African polymath like him cut against the grain of a world of narrow professional boxes, where borders are increasingly closing to “foreigners”.

    This was a man who not only played the jazz changes, but wrote – and lived – the social and political ones.

    The economist who loved jazz

    Born on 16 September 1960 in Maseru, Lesotho, Morojele schooled at the Waterford Kamhlaba United World College in Swaziland (now Eswatini) before being accepted to study at the London School of Economics.

    In London in the early 1980s the young economics student converted his longstanding jazz drumming hobby into a professional side gig. There was a vibrant African diasporic music community, respected by and often sharing stages with their British peers. Morojele worked, among others, in the bands of South African drummer Julian Bahula and Ghanaian saxophonist George Lee. With Lee’s outfit, Dadadi, he recorded Boogie Highlife Volume 1 in 1985.

    Studies completed and back in Lesotho, Morojele founded the small Afro-jazz group Black Market and later the trio Afro-Blue. He worked intermittently with other Basotho music groups including Sankomota, Drizzle and Thabure while building links with visiting South African artists. For them neighbouring Lesotho provided less repressive stages than apartheid South Africa.

    Morojele relocated to Johannesburg in 1995 and picked up his old playing relationship with Lee, by then also settled there. His drum prowess caught the eye of rising star saxophonist Zim Ngqawana. With bassist Herbie Tsoaeli and pianist Andile Yenana, he became part of the reedman’s regular rhythm section.




    Read more:
    Zakes Mda on his latest novel, set in Lesotho’s musical gang wars


    The three rhythm players developed a close bond and a distinctive shared vision, which led to their creating a trio and an independent repertoire. Later they were joined by saxophonist Sydney Mnisi and trumpeter Marcus Wyatt to form the quintet Voice.

    Voice was often the resident band at one of Johannesburg’s most important post-liberation jazz clubs: the Bassline. Although the 1994-founded venue was just a cramped little storefront in a bohemian suburb, it provided a stage for an entire new generation of indigenous jazz and pan-African music in its nine years. Voice was an important part of that identity, audible on their second recording.

    Morojele on drums for Andile Yenana.

    Morojele also recorded with South African jazz stars like Bheki Mseleku and McCoy Mrubata. He appeared on stage with everyone from Abdullah Ibrahim to Feya Faku.

    His drum sound had a tight, disciplined, almost classical swing, punctuated visually by kinetic energy, and sonically by hoarse, breathy vocalisations. Voice playing partner Marcus Wyatt recalls:

    The first time I played with you, I remember being really freaked out by those vocal sound effects coming from the drum kit behind me, but the heaviness of your swing far outweighed the heaviness of the grunting. That heavy swing was in everything you did – the way you spoke, the way you loved, the way you drank, the way you wrote, the way you lived your life.

    Wyatt also recalls a gentle, humble approach to making music together, but spiced with sharp, unmuted honesty – “You always spoke your mind” – and intense, intellectual after-show conversations about much more than music.

    Because Morojele had never abandoned his other life as a development scholar and consultant. He was travelling extensively and engaging with (and acutely feeling the hurt of) the injustices and inequalities of the world. Between those two vocations, a third was insinuating itself into the light: that of writer.

    The accidental writer

    He said in an interview:

    I came to writing almost by accident … I’ve always enjoyed writing (but) I never grew up thinking I was going to be a writer.

    In 2006, after what he described in interviews as a series of false starts, he produced a manuscript that simply “wrote itself”, How We Buried Puso.

    Starting with the preparations for a brother’s funeral, the novel – set in Lesotho – reflects on the diverse personal and societal meanings of liberation in the “country neighbouring” (South Africa) and at home. How new meanings for old practices are forged, and how the personal and the political intertwine and diverge. All set to Lesotho’s lifela music. The book was shortlisted for the 2007 M-Net Literary Award.

    There was an 18-year hiatus before Morojele’s second novel, 2023’s The Three Egg Dilemma. Now that he was settled again in Lesotho, music was less and less a viable source of income, and development work filled his time. “I suppose,” he said, “I forgot I was a writer.” But, in the end, that book “also wrote itself, because I didn’t have an outline … it just became what it is almost by accident.”

    In 2022, a serious health emergency hit; he was transported to South Africa for urgent surgery.

    The Three Egg Dilemma, unfolding against an unnamed near-future landscape that could also be Lesotho, broadens his canvas considerably.

    The setting could as easily be any nation overtaken by the enforced isolation of a pandemic or the dislocation of civil war and military dictatorship, forcing individuals to rethink and re-make themselves. And complicated by the intervention of a malign ghost: a motif that Morojele said had been in his mind for a decade.

    For this powerful second novel, Morojele was joint winner of the University of Johannesburg prize for South African writing in English.

    He was working on his third fiction outing – a collection of short stories – at the time of his death.

    The beauty of his work lives on

    Morojele’s creative career was remarkable. What wove his three identities – musician, development worker and writer – together were his conscious, committed pan-Africanism and his master craftsman’s skill with sound: the sound of his drums and the sound of his words as they rose off the page.

    Through the books, and the (far too few) recordings, that beauty lives with us still. Robala ka khotso (Sleep in peace).

    Gwen Ansell does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Morabo Morojele: Lesotho’s swinging jazz drummer who became a literary star – https://theconversation.com/morabo-morojele-lesothos-swinging-jazz-drummer-who-became-a-literary-star-257256

    MIL OSI – Global Reports

  • MIL-OSI Global: Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions

    Source: The Conversation – Global Perspectives – By Yara M. Asi, Assistant Professor of Global Health Management and Informatics, University of Central Florida

    Palestinians wait in line to receive meals in the Jabalia refugee camp in Gaza City, Gaza, on May 17, 2025. Mahmoud ssa/Anadolu via Getty Images

    After 18 months of punishing airstrikes, raids and an increasingly restrictive siege in Gaza, the United Nations on May 20, 2025, issued one of its most urgent warnings yet about the ongoing humanitarian crisis: an estimated 14,000 babies were at risk of death within the next 48 hours without an immediate influx of substantial aid, especially food.

    The assessment came a day after Israel allowed the first trickle of aid back into Gaza following its nearly three-month total blockade imposed on March 2. But on the first day of that resumption, the U.N. Office for the Coordination of Humanitarian Affairs reported that only nine trucks were allowed into Gaza, when around 500 are required every day. The U.N. called it “a drop in the ocean of what is urgently needed.”

    As an expert in Palestinian public health, I and others have long warned about the potentially devastating humanitarian consequences of Israel’s military response to the Hamas attacks of Oct. 7, 2023, given the preexisting fragility of the Gaza Strip and Israel’s history of controlling humanitarian aid into the territory. Many of those worst-case humanitarian predictions have now become reality.

    Israel’s control of food and aid into Gaza has been a consistent theme throughout the past 18 months. Indeed, just two weeks after Israel’s massive military campaign in the Gaza Strip began in late 2023, Oxfam International reported that only around 2% of the usual amount of food was being delivered to residents in the territory and warned against “using starvation as a weapon of war.”

    Yet aid delivery continues to be inconsistent and well below what was necessary for the population, culminating in a dire warning by U.N. experts in early May that “the annihilation of the Palestinian population in Gaza” was possible without an immediate end to the violence.

    Putting Palestinians ‘on a diet’

    Already, an estimated near 53,000 Palestinians have died and some 120,000 have been injured in the conflict. Starvation could claim many more.

    Amid the broader destruction to lives and infrastructure, there is now barely a food system to speak of in Gaza.

    Since October 2023, Israeli bombs have destroyed homes, bakeries, food production factories and grocery stores, making it harder for people in Gaza to offset the impact of the reduced imports of food.

    A handful of trucks loaded with humanitarian aid for the Gaza Strip are seen at the Kerem Shalom crossing in southern Israel on May 20, 2025.
    AP Photo/Maya Alleruzzo

    But as much as things have worsened in the past 18 months, food insecurity in Gaza and the mechanisms that enable it did not start with Israel’s response to the Oct. 7 attack by Hamas.

    A U.N. report from 2022 found that 65% of people in Gaza were food insecure, defined as lacking regular access to enough safe and nutritious food.

    Multiple factors contributed to this preexisting food insecurity, not least the blockade of Gaza imposed by Israel and enabled by Egypt since 2007. All items entering the Gaza Strip, including food, became subject to Israeli inspection, delay or denial.

    Basic foodstuff was allowed, but because of delays at the border, it could spoil before it entered Gaza.

    A 2009 investigation by Israeli newspaper Ha’aretz found that foods as varied as cherries, kiwi, almonds, pomegranates and chocolate were prohibited entirely.

    At certain points, the blockade, which Israel claimed was an unavoidable security measure, has been loosened to allow import of more foods. In 2010, for example, Israel started to permit potato chips, fruit juices, Coca-Cola and cookies.

    By placing restrictions on food imports, Israel has claimed to be trying to put pressure on Hamas by making life difficult for the people in Gaza. “The idea is to put the Palestinians on a diet, but not to make them die of hunger,” said one Israeli government adviser in 2006.

    To enable this, the Israeli government commissioned a 2008 study to work out exactly how many calories Palestinians would need to avoid malnutrition. The report was released to the public only following a 2012 legal battle. Echoes of this sentiment can be seen in the Israeli decision in May 2025 to allow only “the basic amount of food” to reach Gaza to purportedly ensure “no starvation crisis develops.”

    The long-running blockade also increased food insecurity by preventing meaningful development of an economy in Gaza.

    Displaced Palestinians fleeing amid ongoing Israeli military operations in the Gaza Strip arrive in Jabalia in northern Gaza on May 18, 2025.
    AP Photo/Jehad Alshrafi

    The U.N. cites the “excessive production and transaction costs and barriers to trade with the rest of the world” imposed by Israel as the primary cause of severe underdevelopment in the occupied territories, including Gaza. As a result, in late 2022 the unemployment rate in Gaza stood at around 50%. This, coupled with a steady increase in the cost of food, made affording food difficult for many Gazan households, rendering them dependent on aid, which fluctuates frequently.

    Hampering self-sufficency

    More generally, the blockade and the multiple rounds of destruction of parts of the Gaza Strip have made food sovereignty in the territory nearly impossible.

    Even prior to the latest war, Gaza’s fishermen were regularly shot at by Israeli gunboats if they ventured farther in the Mediterranean Sea than Israel permits. Because the fish closer to the shore are smaller and less plentiful, the average income of a fisherman in Gaza has more than halved since 2017.

    Much of Gaza’s farmland has been rendered inaccessible to Palestinians as a result of post-October 2023 actions by Israel.

    And the infrastructure needed for adequate food production – greenhouses, arable lands, orchards, livestock and food production facilities – has been destroyed or heavily damaged. International donors hesitate to rebuild facilities, knowing they cannot guarantee their investment will last more than a few years before being bombed again.

    The latest ongoing siege has only further crippled the ability of Gaza to be food self-sufficient. By May 2025, nearly 75% of croplands had been destroyed, along with significant amounts of livestock. Less than one-third of agricultural wells used for irrigation remain functional.

    Starvation as weapon of war

    The use of starvation as a weapon is strictly forbidden under the Geneva Conventions, a set of statutes that govern the laws of warfare. Starvation has been condemned by U.N. Resolution 2417, which decried the use of deprivation of food and basic needs of the civilian population and compelled parties in conflict to ensure full humanitarian access.

    Human Rights Watch has already accused Israel of using starvation as a weapon of war, and Amnesty International called the most recent siege evidence of genocidal intent.

    The Israeli government in turn continues to blame Hamas for any loss of life in Gaza and has increasingly made clear its aim for Palestinians to leave Gaza entirely.

    Israeli Prime Minister Benjamin Netanyahu has said publicly that Israel was permitting aid now only because allies were pressuring him over “images of mass famine.” This stance suggests that Israel will not soon increase aid beyond what his government deems politically acceptable.

    While there is more evidence than ever before that Israel is using food as a weapon of war, there is also, I believe, ample evidence that this was the reality long before Oct. 7, 2023.

    In the meantime, the implications for Palestinians in Gaza have never been more dire.

    Already, the World Health Organization estimates that 57 children have died from malnutrition just since the beginning of the March 2, 2025, blockade.

    More death is certain to follow. On May 12, the Integrated Food Security Phase Classification, a global system created to track food insecurity, released an alarming report on projections of food insecurity in Gaza.

    It warned that by September 2025, half a million people in Gaza – 1 in 5 of the population – will be facing starvation and that the entire population will experience acute food insecurity at crisis level, or worse.

    Editor’s note: Parts of this story were originally contained in an article published by The Conversation U.S. on Feb. 15, 2024.

    Yara M. Asi does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Israel has promised ‘basic amount’ of food into Gaza − but its policies have already created catastrophic starvation risk for millions – https://theconversation.com/israel-has-promised-basic-amount-of-food-into-gaza-but-its-policies-have-already-created-catastrophic-starvation-risk-for-millions-257181

    MIL OSI – Global Reports